COUNTER HACK A Step-by-Step Guide to Computer Attacks and Effective Defenses

This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools,...

Full description

Saved in:
Bibliographic Details
Main Author: Skoudis, Ed (Author)
Format: Book
Language:English
Published: New Jersey Prentice-Hall 2002
© 2002
Series:Prentice Hall series in computer networking and distributed systems
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-255153
005 202073111955
008 200803 2002 -US a|| #000 #eng#D
020 # # |a 0130332739  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .S57 2002 
100 1 # |a Skoudis, Ed  |e author 
245 1 1 |a COUNTER HACK  |b A Step-by-Step Guide to Computer Attacks and Effective Defenses  |c Ed Skoudis 
264 # 1 |a New Jersey  |b Prentice-Hall  |c 2002 
264 # 1 |c © 2002 
300 # # |a xxii, 564 pages  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a Prentice Hall series in computer networking and distributed systems 
500 # # |a Includes index 
520 # # |a This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools, and proven, step-by-step countermeasures. Skoudis begins by presenting the hacker's view of networks and their vulnerabilities, with especially detailed coverage of how hackers view the TCP/IP protocol suite. He introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for network vulnerabilities; gaining access and exploiting the system; maintaining access; and preventing detection. Counter Hack presents in-depth descriptions of the most widespread and dangerous attack scenarios, and the most widely-used hacker tools, including war dialers, port scanners, firewall scanners, sniffers, session hijackers, and more. For all system administrators, network administrators, security specialists, and others directly involved in protecting network and computing infrastructure. 
650 # 0 |a Data protection 
650 # 0 |a Computer networks  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=255153 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||