About the Author:
Alfred Basta, PhD, is a professor of mathematics, cryptography, and information security as well as a professional speaker on topics in Internet security, networking, and cryptography. He is a member of many associations including the Mathematical Association of America. Dr. Basta's other publications include MATHEMATICS FOR INFORMATION TECHNOLOGY, LINUX OPERATIONS AND ADMINISTRATION, and DATABASE SECURITY.
Wolf Halton, AB, MSc, is an Instructor in Information Security. He currently serves as the CEO of Halton Technical Services, providing security consulting, web strategy, configuration services, and project management for various clients. Mr. Halton is a professional speaker on the topics of internet security, Linux adoption, and Spam-relief strategies.
Review:
Chapter 1 - Ethics of Hacking and Cracking Chapter 2 - Reconnaissance Chapter 3 - Scanning Tools Chapter 4 - Sniffers Chapter 5 - TCP/IP Vulnerabilities Chapter 6 - Techniques of Password Cracking Chapter 7 - Spoofing Chapter 8 - Session Hijacking Chapter 9 - Hacking Network Devices Chapter 10 - Trojan Horses Chapter 11 - Denial of Service Attacks Chapter 12 - Buffer Overflows Chapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows Vulnerabilities Chapter 17 - Linux Vulnerabilities Chapter 18 - Incident Handling Appendices (H1) A.1 Appendix 1 A.2 Appendix 2: ASCII Code A.3 Appendix 3 -IPv4 IP Packet Structure A.4 Appendix 4 -Hunt Menus A.5 Appendix 5 - Historic Windows Glossary References
"About this title" may belong to another edition of this title.