From the best-selling co-authors of the world-renowned book, Hacking Exposed, comes Hacking Windows 2000 Exposed. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.
"synopsis" may belong to another edition of this title.
Stuart McClure, CISSP, CNE, CCSE (Mission Viejo, CA) is President/Founder of Foundstone, Inc., an elite security consulting and training company. Joel Scambray, CISSP, CCSE (Lafayette, CA) is Managing Principal of Foundstone, Inc., an elite security consulting and training company. Joel is the author of Microsoft fs gAsk Us About cSecurity h column.
"Your all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com
Learn how to secure Windows 2000 from the hacker's perspective
Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.
What You'll Learn:
The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!) How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure SQL and Terminal Server penetration and defense Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System Using privilege escalation exploits to run code as SYSTEM Active Directory and SNMP exploitation How attackers extract password hashes, crack them, and install remote control back doors Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls Debilitating Denial of Service attacks Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named WhistlerYour all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com
Learn how to secure Windows 2000 from the hacker's perspective
Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.
What You'll Learn:
* The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems
* How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!)
* How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure * SQL and Terminal Server penetration and defense * Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System * Using privilege escalation exploits to run code as SYSTEM * Active Directory and SNMP exploitation * How attackers extract password hashes, crack them, and install remote control back doors * Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls * Debilitating Denial of Service attacks * Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences * How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure * What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named Whistler
"About this title" may belong to another edition of this title.
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. 1st. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Seller Inventory # 15745299-6
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR002064126
Quantity: 2 available