For upper level Computer Science courses in Network Security and general courses in Security, as well as an essential resource for system administrators, network administrators, security specialists, and others directly involved in protecting network and computing infrastructure.
Written in an informal, east-to-follow manner, Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses provides a detailed guide to defending against hacker intrusion that will empower every network and system adminstrator to defend their network assets. Covering both Unix and Windows platforms, the book presents in-depth descriptions of the inner workings of the most destructive hacker tools, and proven countermeasures. The techniques in the book apply to all types of organizations using computers and networks including enterprises and service providers, from small to gigantic.
"synopsis" may belong to another edition of this title.
The best part of this book may be two chapters, one each for Windows and Unix, which explain the essential security terms, conventions, procedures and behaviours of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defences. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes and details a modus operandi that's typical of the bad guys.
The Next Generation Hacker Book
The step-by-step guide to defending against hacker intrusions!
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets―whether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:
Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right now―and long-term strategies that will improve security for years to come.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.21
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0130332739
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0130332739
Book Description Paperback. Condition: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Seller Inventory # Scanned0130332739
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0130332739
Book Description Condition: new. Seller Inventory # FrontCover0130332739
Book Description Paperback. Condition: New. Seller Inventory # Abebooks63592
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 2.5. Seller Inventory # Q-0130332739