hacking exposed network security - secrets & solutions, 2nd ed.

736 1.7K 0
hacking exposed network security - secrets & solutions, 2nd ed.

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... then the network is insecure to him but secure to everyone else If the network equipment manufacturer knows about it if security researchers know about it if the hacking community knows about it—the insecurity of the network increases as news of the vulnerability gets out Copyright 2001 The McGraw Hill Companies, Inc Click Here for Terms of Use xvii xviii Hacking Exposed: Network Security Secrets and... developed entire curricula around the contents of Hacking Exposed, using it as a textbook I It has been translated into over a dozen languages, including German, Mandarin Chinese, Spanish, French, Russian, and Portuguese, among others It continues to be an international best-seller xxv xxvi Hacking Exposed: Network Security Secrets and Solutions I Hacking Exposed has consistently ranked in the top 200... representatives from over 20 security- related organizations including security software vendors and academic institutions, published over 1,000 mature, well-understood vulnerabilities to the CVE list in 1999 (http://cve.mitre.org) Copyright 2001 The McGraw Hill Companies, Inc Click Here for Terms of Use xxiii xxiv Hacking Exposed: Network Security Secrets and Solutions L The Computer Security Institute and the... it’s easy to navigate directly to the most relevant information 11 A brand-new companion web site at http://www.hackingexposed.com with up-to-the-minute news and links to all tools and Internet resources referenced in the book 12 Did we mention the new Foreword from respected security titan Bruce Schneier of Counterpane Internet Security? Oh, yes, we did… All of this great new material combines to pack... had the chance to see what Hacking Exposed is all about Enjoy! —Joel, Stu, & George xxix Introduction 8 Updated coverage of security attacks against Windows 9x, Millennium Edition (ME), Windows NT, UNIX, Linux, NetWare, and dozens of other platforms, with appropriate countermeasures 9 A revised and updated dial-up hacking chapter with new material on PBX and voicemail system hacking and an updated VPN... Countermeasures: New Windows Security Tools Group Policy runas Summary xi xii Hacking Exposed: Network Security Secrets and Solutions M 7 Novell NetWare Hacking ... xxviii Hacking Exposed: Network Security Secrets and Solutions Easier to Navigate with Improved Graphics, Risk Ratings With the help of our publisher, Osborne/McGraw-Hill, we’ve spruced up the aesthetics based on suggestions from readers: M ] Every attack technique is highlighted with a special icon in the margin like this: This Is an Attack Icon making it easy to identify specific penetration-testing...x Hacking Exposed: Network Security Secrets and Solutions M 2 Scanning Scan Types Identifying TCP and UDP Services Running Windows-Based Port Scanners Port Scanning Breakdown Active Stack Fingerprinting Passive... Schneier, 1 July 2000 CTO, Counterpane Internet Security, Inc http://www.counterpane.com Bruce Schneier is founder and CTO of Counterpane Internet Security, Inc (http://www counterpane.com), the premier Managed Security Monitoring company He is a designer of Blowfish, Twofish, and Yarrow His most recent book is Secrets and Lies: Digital Security in a Networked World xix This page intentionally left... Companies, Inc Click Here for Terms of Use xxi xxii Hacking Exposed: Network Security Secrets and Solutions We would like to thank all of our colleagues at Foundstone for providing so much help and guidance on many facets of this book In particular, we acknowledge Stephan Barnes for his contributions to the discussion of PBX and voicemail system hacking in Chapter 9, and Erik Pace Birkholz for his

Ngày đăng: 25/03/2014, 11:21

Mục lục

  • HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND EDITION

    • Cover

    • About the Authors

      • Joel Scambray

      • Stuart McClure

      • George Kurtz

      • About the Technical Reviewers

        • Saumil Shah

        • Victor Robert "Bob" Garza

        • Eric Schultze

        • Martin W. Dolphin

        • CONTENTS

        • FOREWORD

        • ACKNOWLEDGMENTS

        • INTRODUCTION

          • INTERNET SECURITY-DEATH BY A THOUSAND CUTS

            • The Solution: More Information

              • 100,000 Readers Already Know

              • An International Best- Seller

              • What's New in the Second Edition

                • Over 220 Pages of New Content

                • To All Readers Past, Present, and Future

                • The Strengths of the First Edition Remain: Modularity,

                • Organization, and Accessibility

                • Easier to Navigate with Improved Graphics, Risk Ratings

                • This Is an Attack Icon

                • This Is a Countermeasure Icon

Tài liệu cùng người dùng

Tài liệu liên quan