From the best-selling co-authors of the world-renowned book, Hacking Exposed, comes Hacking Windows 2000 Exposed. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.
"synopsis" may belong to another edition of this title.
Stuart McClure, CISSP, CNE, CCSE (Mission Viejo, CA) is President/Founder of Foundstone, Inc., an elite security consulting and training company. Joel Scambray, CISSP, CCSE (Lafayette, CA) is Managing Principal of Foundstone, Inc., an elite security consulting and training company. Joel is the author of Microsoft fs gAsk Us About cSecurity h column.
"Your all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com
Learn how to secure Windows 2000 from the hacker's perspective
Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.
What You'll Learn:
The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!) How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure SQL and Terminal Server penetration and defense Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System Using privilege escalation exploits to run code as SYSTEM Active Directory and SNMP exploitation How attackers extract password hashes, crack them, and install remote control back doors Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls Debilitating Denial of Service attacks Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named WhistlerYour all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com
Learn how to secure Windows 2000 from the hacker's perspective
Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.
What You'll Learn:
* The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems
* How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!)
* How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure * SQL and Terminal Server penetration and defense * Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System * Using privilege escalation exploits to run code as SYSTEM * Active Directory and SNMP exploitation * How attackers extract password hashes, crack them, and install remote control back doors * Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls * Debilitating Denial of Service attacks * Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences * How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure * What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named Whistler
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 2.45. Seller Inventory # G0072192623I5N00
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # 12526180-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st. Used book that is in clean, average condition without any missing pages. Seller Inventory # 9958791-6
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Fair. A readable copy of the book which may include some defects such as highlighting and notes. Cover and pages may be creased and show discolouration. Seller Inventory # GOR014439487
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR002064126
Quantity: 1 available
Seller: Chesil Books, DORCHESTER, United Kingdom
Soft cover. Condition: Very Good. 1st Edition. Osborne/ Mcgraw-Hill, 2001; pp xxx, 495; detailed index and numerous code fragments and tables in the text; very good copy. This is, apparently, "A treasure trove of information no Windows adminstrator should be without". MRDA, perhaps, but nevertheless accurate enough in denoting a book setting out the security flaws in Windows 2000 and how to address these written by a couple of very knowledgeable hackers (that noun used in the correct sense of the word). And as there are still numerous instances of active W2K installations around, still a very useful work despite its age. Seller Inventory # 000049
Quantity: 1 available