If you don’t hack your systems, who will?
One of the reasons I put this book project together is that I believe security professionals should be hackers. In this case, by hackers, I mean people who are capable of defeating security measures. This book purports to teach people how to be hackers. In reality, most of the people who buy this book will do so because they want to protect their own systems and those of their employer. So, how can you prevent break-ins to your system if you don’t know how they are accomplished? How do you test your security measures? How do you make a judgment about how secure a new system is?
When you’re through reading Hack Proofing Your Network, you’ll understand terms like “smashing the stack,” “blind spoofing,” “building a backward bridge,” “steganography,” “buffer overflow” and you’ll see why you need to worry about them. You will learn how to protect your servers from attacks by using a 5-step approach:
1. Planning
2. Network/Machine Recon
3. Research/Develop
4. Execute Attack and Achieve Goal
5. Cleanup
And you’ll understand the theory of hacking, how to fend off local and remote attacks, and how to report and evaluate security problems.
The Only Way to Stop a Hacker Is to Think Like One.
---Ryan Russell, Hack Proofing Your Network
"synopsis" may belong to another edition of this title.
Too many network administrators depend on the "big sky" principle of network security--they believe that the large number of Internet-connected machines out there will keep black-hat hackers away. Hack Proofing Your Network: Internet Tradecraft points out that statistics are no defense, and that such an attitude is irresponsible. The book shows steps that you can take to harden your resources against attack. Although most of the material in this book isn't up-to-the-minute (how could it be, when the tactics of attackers change daily), you can discourage hackers by implementing the strategies that it describes.
Many antihacking texts assume a fair bit of knowledge, but this one doesn't. Ryan Russell and coauthors explain many terms and concepts, such as traffic sniffing, cryptography, and file differentiation ("diffing"), and the tools that evildoers use to wreak havoc on the systems that they attack--complete with Internet addresses from which you can download them. The book walks you through sample attacks, too, such as hijacking a connection by using a tool called Hunt. Overall, this is a fine introductory-to-intermediate antihacking volume that leads well into more current and advanced resources. You might want to supplement it with two other practical computer-security books: Hacking Exposed catalogues many of the tools that bad guys use, while Network Intrusion Detection helps you analyze security logs and spot attacks in progress. --David Wall
Topics covered:
Kevin Mitnick's quote on the Hack Proofing cover says it nicely:
“Ryan Russell has an important message for us all: "What you don't know *will* hurt you." In his book, "Hack Proofing Your Network: Internet Tradecraft" Ryan reveals the "how to" of systems penetration techniques that intruders may use against you! While "full disclosure" is a two-edged sword, the benefits include forcing software manufacturers to quickly fix security holes and informing potential victims of the vulnerabilities that exist in their infrastructures.”—Kevin Mitnick
This book brings together some of the most talented IPSec professionals and prominent grey-hat hackers to tell you how to protect your systems from attack. The focus is on the practical and the objective is to leave you with the know-how and tools to deal with virus, session hijacking, client holes, spoofing, and more.
Learn from the best: Mudge, advisor to the WHite House and Congress; Rain Forest Puppy; Elisa Levy, BUGTRAQ moderator; Blue Boar, Vuln-Dev moderator; Dan “Effugas” Kaminsky, Advanced Network Services division, Cisco Systems; Oliver Friedrichs, Co-founder, SecurityFocus.com; Riley "Caezar" Eller, Senior Security Engineer, Internet Security Advisors; Greg Hoglund, Founder, Click To Secure
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Shipping:
FREE
Within U.S.A.
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00049498821
Quantity: 1 available
Seller: Once Upon A Time Books, Siloam Springs, AR, U.S.A.
paperback. Condition: Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . Seller Inventory # mon0000837290
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Used book that is in clean, average condition without any missing pages. Seller Inventory # 40964418-6
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Seller Inventory # GOR003239281
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.34. Seller Inventory # G1928994156I4N00
Quantity: 1 available
Seller: AwesomeBooks, Wallingford, United Kingdom
Paperback. Condition: Very Good. Hack Proofing your Network: Internet Tradecraft This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9781928994152
Quantity: 1 available
Seller: Bahamut Media, Reading, United Kingdom
Paperback. Condition: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 6545-9781928994152
Quantity: 1 available
Seller: medimops, Berlin, Germany
Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M01928994156-G
Quantity: 1 available
Seller: Better World Books Ltd, Dunfermline, United Kingdom
Condition: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # 40647974-20
Quantity: 3 available
Seller: Godley Books, Hyde, United Kingdom
Soft Cover. Condition: Near Fine. No marks or inscriptions. Tiniest creases to lower corners, none to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 450pp. Reveals the penetration techniques that intruders may use against youand how to protect your servers against them. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9.25 x 7.25 inches. Seller Inventory # 025457
Quantity: 1 available