Stock Image

Hacking Exposed 5th Edition: Network Security Secrets And Solutions

Stuart McClure; Joel Scambray; George Kurtz

975 ratings by Goodreads
ISBN 10: 0072260815 / ISBN 13: 9780072260816
Published by McGraw-Hill Osborne Media, 2005
Used Condition: Good Soft cover
From Ergodebooks (RICHMOND, TX, U.S.A.)

AbeBooks Seller Since May 31, 2006 Seller Rating 4-star rating

Quantity Available: 1

Buy Used
Price: US$ 15.96 Convert Currency
Shipping: US$ 3.99 Within U.S.A. Destination, rates & speeds
Add to basket

30 Day Return Policy

About this Item

Bookseller Inventory # SONG0072260815

Ask Seller a Question

Bibliographic Details

Title: Hacking Exposed 5th Edition: Network ...

Publisher: McGraw-Hill Osborne Media

Publication Date: 2005

Binding: Paperback

Book Condition: Good

About this title

Synopsis:

The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure. --Bill Machrone, PC Magazine

.

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

.

"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX Review

. .

Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes:

.
    .
  • Code hacking methods and countermeasures.
  • New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications.
  • Latest DDoS techniques--zombies, Blaster, MyDoom.
  • All new class of vulnerabilities--HTTP Response Splitting.
  • and much more.
.

From the Back Cover:

"A must-read for anyone in security. One of the best security books available." . --Tony Bradley, CISSP, About.com

.

"Authoritative.Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee

.

"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times

.

"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." Bill Machrone, PC Magazine

.

"With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." Mirko Zorz, Net-security.org

.

The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. .

. New and Updated Material:.

  • New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them.
  • New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits.
  • Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures.
  • Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners.
  • New content on remote connectivity including VoIP hacking.
  • New coverage of web and e-mail client hacking, including the latest Internet
  • Explorer exploits, phishing, spyware, rootkits, and bots.
  • New hacks and countermeasures using Google as a reconnaissance tool.
  • An updated footprinting chapter that deals with changes regarding finding information from Internet databases.
  • Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks
.

"About this title" may belong to another edition of this title.

Store Description

Welcome to Our AbeBooks Store for books. I've been selling books for long and have achieved more than 99% positive feedback on eBay and amazon.com. I always strive to achieve best customer satisfaction and have always described book accurately. I got lot of Out of Print and Rare books in my store and still adding lot of books. I will ship book within 24 hours of confirmed payment

Visit Seller's Storefront

Terms of Sale:

100 % Customer Satisfaction is our Goal. Please contact me if you are not
satisfied with your order in any manner. I always list book by ISBN # only and
buyer is assured of correct edition, correct author and correct format of book.
I
will do my best to address your concerns including 100% refund of your money.

Name of your business and form of legal entity: Ami Ventures Inc.S-Corp. USA
your business address: 25547 Canyon Crossing Dr. Richmond TX 77406 USA
email address and phone or fax number: ...

More Information
Shipping Terms:

Orders usually ship within 1 business days. If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal