Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    What I'm Giving | November 29, 2014

    Neil Patrick Harris: IMG Neil Patrick Harris: What I'm Giving



    At Powell's, we feel the holidays are the perfect time to share our love of books with those close to us. For this special blog series, we reached... Continue »

    spacer

On Order

$137.95
New Hardcover
Currently out of stock.
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
- Local Warehouse Networking- Computer Security

More copies of this ISBN

The Hacker's Handbook

by

The Hacker's Handbook Cover

 

Synopses & Reviews

Publisher Comments:

The Hacker 's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a path to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Book News Annotation:

For computer network administrators trying to keep a step ahead of hackers, U.S. security experts who work with the public and private sectors provide in-depth coverage of defensive and offensive hardware and software strategies for playing what they view as a chess game to foil unauthorized penetration of databases and such. They provide case studies, an anatomy of attack framework, and an explanation of hacker ethics. The Web sites references come with the warning to approach unknown sites with caution. Distributed by CRC.
Annotation 2004 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.

Synopsis:

Know your enemy. The best defense is a good offense. These adages have stood the test of time. As recent attacks have demonstrated, organizations are virtually helpless against most hacker, industrial espionage, or information terrorist attacks. The Hacker's Handbook presents an organized profile of these enemies of the commonwealth. It explains who they are, what they do, and how they do it. It details the tools they use and what they look like when they use them. It discusses effective countermeasures and how to deploy them quickly. By knowing how the bad guys think, or better yet, thinking like the bad guys, the good guys can start to turn the tide of battle.
-- Provides an organized physiological and sociological profile of the Hacker
-- Includes explicit instructions describing how hackers use techniques and tools to break into systems from both the inside and outside
-- Examines changing the focus of the IT admin's priorities and points to a more effective security philosophy
-- Addresses the "it can't happen to me thought process" at work and at home
-- Explores how to develop an offensive and defensive game plan and provides the tools to make it effective

Product Details

ISBN:
9780849308888
Author:
Hansen, J. Burke
Publisher:
Auerbach Publications
Author:
Young, Susan
Author:
Aitel, Dave
Location:
Boca Raton
Subject:
General
Subject:
Computer networks
Subject:
Security
Subject:
Computer hackers
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Subject:
Networking-Computer Security
Edition Description:
Includes bibliographical references and index.
Series Volume:
no. 4
Publication Date:
20031131
Binding:
Paperback
Language:
English
Illustrations:
Yes
Pages:
696
Dimensions:
9.52x6.22x2.06 in. 3.01 lbs.

Other books you might like

  1. Anti Hacker Tool Kit 2ND Edition Used Trade Paper $1.00
  2. Hacker Web Exploitation Uncovered New Trade Paper $36.25
  3. Hacker's Challenge 3: 20 Brand-New... New Trade Paper $55.00
  4. Defeating the Hacker: A... New Hardcover $36.25
  5. The Database Hacker's Handbook:... New Trade Paper $45.95

Related Subjects

Computers and Internet » Networking » Computer Security
Education » Writing
History and Social Science » Politics » General
History and Social Science » Politics » United States » Foreign Policy
Reference » Student Guides
Religion » Comparative Religion » General
Science and Mathematics » Agriculture » Aquaculture
Science and Mathematics » Chemistry » Chemical Engineering
Science and Mathematics » Mathematics » Analysis General
Science and Mathematics » Mathematics » Applied

The Hacker's Handbook New Hardcover
0 stars - 0 reviews
$137.95 Backorder
Product details 696 pages Auerbach Publications - English 9780849308888 Reviews:
"Synopsis" by , Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.
"Synopsis" by , Know your enemy. The best defense is a good offense. These adages have stood the test of time. As recent attacks have demonstrated, organizations are virtually helpless against most hacker, industrial espionage, or information terrorist attacks. The Hacker's Handbook presents an organized profile of these enemies of the commonwealth. It explains who they are, what they do, and how they do it. It details the tools they use and what they look like when they use them. It discusses effective countermeasures and how to deploy them quickly. By knowing how the bad guys think, or better yet, thinking like the bad guys, the good guys can start to turn the tide of battle.
-- Provides an organized physiological and sociological profile of the Hacker
-- Includes explicit instructions describing how hackers use techniques and tools to break into systems from both the inside and outside
-- Examines changing the focus of the IT admin's priorities and points to a more effective security philosophy
-- Addresses the "it can't happen to me thought process" at work and at home
-- Explores how to develop an offensive and defensive game plan and provides the tools to make it effective
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.