Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit

Chirillo, John

 
9780471232827: Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit

Synopsis

The much–anticipated second edition of the bestselling book that details network security through the hacker′s eye
Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all–in–one reference with forty percent new material.
In this fascinating new edition, you′ll discover:
∗ The hacker′s perspective on security holes in UNIX, Linux, and Windows networks
∗ Over 170 new vulnerabilities and exploits
∗ Advanced discovery techniques
∗ A crash course in C for compiling hacker tools and vulnerability scanners
∗ The top seventy–five hack attacks for UNIX and Windows
∗ Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
∗ TigerSuite Professional 3.5 (full suite single license)

"synopsis" may belong to another edition of this title.

About the Author

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

From the Back Cover

The much–anticipated second edition of the bestselling book that details network security through the hacker′s eye

Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all–in–one reference with forty percent new material.

In this fascinating new edition, you′ll discover:
∗ The hacker′s perspective on security holes in UNIX, Linux, and Windows networks
∗ Over 170 new vulnerabilities and exploits
∗ Advanced discovery techniques
∗ A crash course in C for compiling hacker tools and vulnerability scanners
∗ The top seventy–five hack attacks for UNIX and Windows
∗ Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
∗ TigerSuite Professional 3.5 (full suite single license)

"About this title" may belong to another edition of this title.