Best way to secure your network? Break in! And that's exactly what InfoWorld security watch columnists Stuart McClure and Joel Scambray plus Extreme Hacking instructor George Kurtz show you how to do in Hacking Exposed: Network Security Secrets & Solutions. Arming you with a hacker's arsenal, they help you pinpoint vulnerable areas and apply effective security countermeasures in UNIX (including Linux), Windows NT/95/98, and Novell networks. You'll discover the "InfoWorld Security Sweet 16" the top 16 hacks the authors themselves use to test systems and the top 15 security flaws that commonly afflict networks. In no time you'll learn how to... *Repair e-mail and Web security holes *Find and eliminate back doors, Trojan horses, viruses, and buffer overflows *Recognize exposures from dial-up modems, modem pools, and RAS servers *Locate and scan for vulnerable systems using Whois, Domain Name System queries, Ping sweeps, Port scans, and OS detection *Crack accounts and passwords, escalate privilege, and exploit trusts *And much, much more.
"synopsis" may belong to another edition of this title.
Whenever Hollywood does a movie in which someone breaks into a computer, the hacking scenes are completely laughable to anyone who knows the first thing about computer security. Think of Hacking Exposed: Network Security Secrets and Solutions as a computer thriller for people with a clue. This is a technical book, certainly--URLs, procedures, and bits of advice take the place of plot and characters--but the information about hackers' tools will leave you wondering exactly how vulnerable your system is. More to the point, the explicit instructions for stealing supposedly secure information (a Windows NT machine's Security Access Manager file, for example) will leave you absolutely certain that your computers have gaping holes in their armor.
The book describes the security characteristics of several computer-industry pillars, including Windows NT, Unix, Novell NetWare, and certain firewalls. It also explains what sorts of attacks against these systems are feasible, which are popular, and what tools exist to make them easier. The authors walk the reader through numerous attacks, explaining exactly what attackers want, how they defeat the relevant security features, and what they do once they've achieved their goal. In what might be called after-action reports, countermeasures that can help steer bad buys toward less-well-defended prey are explained. If you run Linux, you may want to supplement the Unix information in this book with Maximum Linux Security, another practical-minded and very popular security text. --David Wall
Topics covered: The state of the art in breaking into computers and networks, as viewed from the vantage point of the attacker and the defender. There's information on surveying a system remotely, identifying weak points, and exploiting weaknesses in specific operating systems (Windows NT, Unix, and Novell NetWare, mostly). Coverage also includes war dialers, circumventing firewalls, denial-of-service attacks, and remote-control software. There's a cool appendix on the security characteristics of Windows 2000.
It's 1 a.m...Do You Know Who's on Your Network? Defend your network against the sneakiest hacks and latest attacks! In this must-have handbook, security experts Stuart McClure, Joel Scambray, and George Kurtz give you the full scoop on some of the most highly publicized and insidious break-ins - and show you how to implement bulletproof security on your own system. All aspects of network security are included - from informational scans and probes to password vulnerabilities, dialup networking insecurities, buffer overflows, web and email insecurities, trojans, and back doors. Hacking Exposed: Network Security Secrets & Solutions covers all security, auditing, and intrusion detection procedures for UNIX (including Linux), Windows NT/95/98, and Novell networks. Learn to: Find, exploit, and apply countermeasures for security holes in UNIX, Linux, Windows NT/95/98, and Novell networks.
Repair email and web security holes (CGI, Perl, ASP, browsers, and hostile mobile code).
Understand how back channels and port redirection are used to circumvent firewalls.
Locate and scan for vulnerable systems using Whois, Domain Name System queries, Ping Sweeps, Port scans, and OS detection.
Enumerate users, groups, shares, file systems, and services with no authentication. Crack accounts and passwords, escalate privilege, and exploit trusts.
Find and eliminate back doors, Trojan horses, viruses, and buffer overflows.
Implement auditing and intrusion detection solutions.
Recognize vulnerabilities from dialup modems, modem pools, and RAS servers.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Decluttr, Kennesaw, GA, U.S.A.
Condition: Very Good. 1724853216. 8/28/2024 1:53:36 PM. Seller Inventory # U9780072121278
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00082347187
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Acceptable. Item in acceptable condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00078556710
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 39242553-6
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP56642808
Quantity: 1 available
Seller: Off The Shelf, Antonia, MO, U.S.A.
Condition: Good. The item shows wear from consistent use, but it remains in good condition and works perfectly. All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. May NOT include discs, access code or other supplemental materials. Seller Inventory # 4WILKM00LAH1
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.3. Seller Inventory # G0072121270I3N00
Quantity: 1 available
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0072121270-11-1
Quantity: 2 available
Seller: The Maryland Book Bank, Baltimore, MD, U.S.A.
paperback. Condition: Good. Corners are bent Used - Good. Seller Inventory # 4-R-6-0225
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR003474549
Quantity: 3 available