Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets & Solutions

Buy
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of Internet security moves even faster than the digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world countermeasures in this one-of-a-kind volume to plug the holes in your network today--before they end up in the headlines tomorrow. New and Updated Material: Brand new "Hacking the Internet User" chapter covers insidious Internet client attacks against web browsers, email software, and active content, including the vicious new Outlook email date field buffer overflow and ILOVEYOU worms. A huge new chapter on Windows 2000 attacks and countermeasures covers offline password database attacks and Encrypting File System (EFS) vulnerabilities. Coverage of all the new Distributed Denial of Service (DDoS) tools and techniques that almost broke down the Internet in February 2000 (Trinoo, TFN2K, Stacheldraht). Significantly updated e-commerce hacking methodologies including new IIS and Cold Fusion vulnerabilities. A revised and updated dial-up chapter with new material on PBX and voicemail system hacking. New network discovery tools and techniques, including an updated section on Windows-based scanners, how to carry out eavesdropping attacks on switched networks using ARP redirection, and RIP spoofing attacks. Coverage of new back doors and forensic techniques, including defenses against Win9x back doors like Sub7. Updated coverage of security attacks against Windows 9x, Windows Me, Windows 2000, Windows NT, UNIX, Linux, NetWare, and dozens of other platforms, with appropriate countermeasures.

About the Author
Joel Scambray (Lafayette, CA) is a Manager in the Information Systems Audit and Advisory Services practice of Ernst & Young. Joel has over five years experience working with a variety of computer and communications technologies from both an operational and strategic standpoint--ranging from Director of IS for a major commercial real estate firm to Technology Analyst for Info World Magazine. Stuart McClure (Sunnyvale, CA) is a Senior Manager in the Information Security Services of Ernst & Young. Stuart has over nine years of network and systems security experience. Beginning his career at University of Colorado, Boulder and eventually starting his own consulting company, he has the vast security knowledge from working in both corporate and government environments. George Kurtz brings his extensive knowledge of Unix security to the book to ensure its truly comprehensive network security coverage.
(HTML tags aren't allowed.)

JIRA 5.x Development Cookbook
JIRA 5.x Development Cookbook

This book is your one-stop resource for mastering JIRA extensions and customizations Overview Extend and customize JIRA; work with custom fields, workflows, reports, gadgets, JQL functions, plugins, and more Customize the look and feel of your JIRA user interface by adding new tabs, web items and sections, drop down menus, and more Master JQL...

Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
World on the Edge: How to Prevent Environmental and Economic Collapse
World on the Edge: How to Prevent Environmental and Economic Collapse

When I meet old friends and they ask, "How are you?" I often reply, "I'm fine; it's the world I am worried about." "Aren't we all" is the common response. Most people have a rather vague sense of concern about the future, but some worry about specific threats such as climate change or population...


The Esoteric Investor: Alternative Investments for Global Macro Investors
The Esoteric Investor: Alternative Investments for Global Macro Investors

Massive demographic, environmental, economic, and regulatory shifts are generating huge new investment opportunities with an exceptionally high probability of success over the coming years and decades. In The Esoteric Investor, a world-class portfolio manager identifies these investments, and shows how your best...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Handbook of Therapeutic Storytelling: Stories and Metaphors in Psychotherapy, Child and Family Therapy, Medical Treatment, Coaching and Supervision
Handbook of Therapeutic Storytelling: Stories and Metaphors in Psychotherapy, Child and Family Therapy, Medical Treatment, Coaching and Supervision

The Handbook of Therapeutic Storytelling enables people in the healing professions to utilise storytelling, pictures and metaphors as interventions to help their patients.

Communicating in parallel worlds and using simple images and solutions can help to generate positive attitudes, which can then be nurtured and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy