"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more." --Lance Spitzner, Sun Microsystems GESS Security Team and the coordinator of the Honeynet Project
"Whether you're a struggling novice or a seasoned pro--Hacking Exposed, Third Edition is required reading." --Barnaby Jack, Win32 Buffer Overflow expert
CD-ROM contains key security tools ready to install on your computer, links to the security tools covered in the book, and a password database.
Harden your computers and networks against compromise by digital marauders today with this fully revised, essential volume. Hacking Exposed: Network Security Secrets ; Solutions, Third Edition shows you how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Renowned security experts Stuart McClure, Joel Scambray, and George Kurtz provide detailed examples of the latest devious break-ins and destructive attacks and show you, step-by-step, how to protect your systems. You'll get brand-new coverage of technologies like 802.11 Wireless Networking expanded coverage of Denial of Service, VPN, dial-up, and remote access hacks, and all-new security information on Windows XP, Windows.NET Server (code named Whistler), and IIS 5.
New and Updated Material:
- The latest 802.11 Wireless networking security attacks and countermeasures
- Fully up-to-date information on the latest Windows, UNIX, Linux, and NetWare hacks and countermeasures in the tried-and-true Hacking Exposed format
- New techniques used by today's hacker to pinpoint potential targets--ping sweep tools, TCP/UDP scans, traceroutes, whois queries, and zone transfer downloads
- Significantly revised chapters on analog dial-up and Web attacks
- Brand-new coverage of Windows XP, Windows.NET Sever (code named Whistler), and IIS 5 vulnerabilities like Code Red
- New UNIX material including the latest Format String vulnerabilities
- The latest remote control vulnerabilities in VNC and Terminal Server
- New strategies for preventing untrusted access to SNMP, Active Directory, and NetBIOS/SMB services using IPSec filters, firewalls, and TCP/IP Security
- The most recent techniques for securing and managing Microsoft SQL Server and Internet Clients in networked environments
About the Author Stuart McClure (Sunnyvale, CA) is a Senior Manager in the Information Security Services of Ernst & Young. Stuart has over nine years of network and systems security experience. Beginning his career at University of Colorado, Boulder and eventually starting his own consulting company, he has the vast security knowledge from working in both corporate and government environments. Joel Scambray (Lafayette, CA) is a Manager in the Information Systems Audit and Advisory Services practice of Ernst & Young. Joel has over five years experience working with a variety of computer and communications technologies from both an operational and strategic standpoint--ranging from Director of IS for a major commercial real estate firm to Technology Analyst for Info World Magazine. George Kurtz brings his extensive knowledge of Unix security to the book to ensure its truly comprehensive network security coverage.