Cover image for Hack proofing your network
Title:
Hack proofing your network
Author:
Russell, Ryan, 1969-
Edition:
Second edition.
Publication Information:
Rockland, Mass. : Syngress Media, [2002]

©2002
Physical Description:
xxxiv, 789 pages : illustrations ; 24 cm
General Note:
"94709"--Spine.

Previous ed.: 2000.
Language:
English
Added Author:
ISBN:
9781928994701
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Central Library QA76.9.A25 H33 2001 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

A new edition the most popular Hack Proofing book around!

IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network , teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.


Table of Contents

Foreword v 1.5p. xxix
Foreword v 1.0p. xxxiii
Chapter 1 How To Hackp. 1
Chapter 2 The Laws of Securityp. 11
Chapter 3 Classes of Attackp. 45
Chapter 4 Methodologyp. 99
Chapter 5 Diffingp. 131
Chapter 6 Cryptographyp. 165
Chapter 7 Unexpected Inputp. 205
Chapter 8 Buffer Overflowp. 243
Chapter 9 Format Stringsp. 319
Chapter 10 Sniffingp. 361
Chapter 11 Session Hijackingp. 407
Chapter 12 Spoofing: Attacks on Trusted Identityp. 443
Chapter 13 Tunnelingp. 527
Chapter 14 Hardware Hackingp. 609
Chapter 15 Viruses, Trojan Horses, and Wormsp. 655
Chapter 16 IDS Evasionp. 689
Chapter 17 Automated Security Review and Attack Toolsp. 719
Chapter 18 Reporting Security Problemsp. 749
Indexp. 767

Google Preview