"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." --Bill Machrone, "PC Magazine"
This brand-new edition of the best-selling security book covers all the latest hacks and countermeasures and includes a bonus DVD with the authors' famous "Hacking Exposed Live" presentation!
"synopsis" may belong to another edition of this title.
This edition contains updated hacks and countermeasures throughout, including denial of service attacks, email attacks, viruses and web hacks. It also covers database security, Windows.NET Server, and Novell 5.Review:
A lot of computer security textbooks approach the subject from a defensive point of view. "Do this, and you'll probably survive a particular kind of attack", they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane's-like catalogue of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the most powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There is a lot of new stuff on electronic mail worms, distributed denial of service (DDoS) attacks and attacks that involve routing protocols.
The result of all this familiarity with bad-guy tools is a leg up on defending against them. Hacking wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products they aren't impressed with, and hesitate not in pointing out inherent, uncorrectable security weaknesses where they find them. This is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all you network administrators to know thy enemies. --David Wall
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Osborne Media. PAPERBACK. Book Condition: New. 0072227427. Bookseller Inventory # C65-N0008
Book Description McGraw-Hill Osborne Media. PAPERBACK. Book Condition: New. 0072227427 New, unused, soft-cover book with minor cover and/or page damage (typically cut, tear, crease, etc.). Content is NOT affected. Used items may or may not include CDs, InfoTrac, etc. Item ships within 24 hours with free tracking. Bookseller Inventory # 62976
Book Description McGraw-Hill Osborne Media, 2003. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service!. Bookseller Inventory # ABE_book_new_0072227427
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: New. 4. Bookseller Inventory # DADAX0072227427
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800722274201.0
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: New. book. Bookseller Inventory # 0072227427
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: New. Bookseller Inventory # P110072227427