This specific ISBN edition is currently not available.View all copies of this ISBN edition:
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.
"synopsis" may belong to another edition of this title.
The primary objective of this book is to lay a solid foundation from which to explore the world of security. This book tells the truth to bring awareness about the Underground, the hacker’s community, and to provide the tools for doing so.
The difference between this book and other manuscripts is that it is written from a hacker’s perspective. The internetworking primers in Parts 1 and 2, coupled with Chapter 6, “The Hacker’s Technology Handbook, will educate you about the technologies required to delve into security and hacking. These chapters can be skimmed if your background is technically sound, and later used as references. Part 3 reviews the tools and vulnerability exploits that rule “hackerdom.” Part 4 continues by describing covert techniques used by hackers, crackers, phreaks, and cyberpunks to penetrate security weaknesses. Part 5 reveals hacking secrets of gateways, routers, Internet server daemons, operating systems, proxies, and firewalls. Part 6 concludes with the software and construction necessary for compiling a TigerBox, used by security professionals and hackers for sniffing, spoofing, cracking, scanning, spying, and penetrating vulnerabilities. Throughout this book you will also encounter In! tuitive Intermissions, real-life interludes about hacking and the Underground. Through them you’ll explore a hacker’s chronicles, including a complete technology guide.
Who Should Read This Book
Evaluators of this book have suggested that this book it may become a required reference for managers, network administrators, network engineers, internetworking engineers, even interested laypeople—the hacking enthusiast and admirer of such films as Sneakers, The Matrix, and Hackers.From the Back Cover:
Beat hackers at their own game - The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box(r) system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.
In this highly provocative work, you'll discover:
? The hacker's perspective on networking protocols and communication technologies
? A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
? Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
? Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks
"About this title" may belong to another edition of this title.
Book Description Wiley, 2001. Paperback. Condition: New. Never used!. Seller Inventory # P11047141624X
Book Description Wiley. PAPERBACK. Condition: New. 047141624X New Condition. Seller Inventory # NEW99.1935616
Book Description John Wiley & Sons. Condition: New. pp. 800. Seller Inventory # 7570542
Book Description Wiley, 2001. Condition: New. book. Seller Inventory # M047141624X
Book Description Wiley, 2001. Paperback. Condition: New. 1. Seller Inventory # DADAX047141624X
Book Description Condition: New. New. Seller Inventory # STR-047141624x
Book Description Wiley, 2001. Paperback. Condition: New. 1. Ships with Tracking Number! INTERNATIONAL WORLDWIDE Shipping available. Buy with confidence, excellent customer service!. Seller Inventory # 047141624Xn