9780273750758
 

Hacking Exposed 5th Edition

Network Security Secrets and Solutions

All Categories > Computer Science > Data Communication & Networking

Authors: Stuart Mcclure, Joel Scambray, George Kurtz
  • ISBN: 9780072260816
  • Price: LE 80.00
  • Special Offer Price: LE 64.00
  • Number Of Pages: 692
  • Edition: 5 Edition
  • Publication Date: 2005
  • Categories Data Communication & Networking  

This book is out of stock. If you need it, please Contact Us

Description:

... Hacking Exposed, the seminal book on white-hat hacking and countermeasures. Hacking Exposed (www.hackingexposed.com) is now in its second edition, and should be required reading for anyone with a server or a network to secure. (Bill Machrone, VP, Technology for ZiffDavis Media) (PC Magazine )

If you are a computer professional with an eye to the publishing world, you’re probably familiar with a big red book called Hacking Exposed. This bold book with its bold title often appears at the end of the aisle or in other easy-to-reach locations. The reason for all the attention -- and brisk sales -- is that this book really is different. For almost any computer book, you can find a clone. But not this one. Hacking Exposed is a one-of-a-kind study of the art of breaking in. The authors, a trio of security consultants for Foundstone, Inc., take the reader through a spectrum of intrusion tools and strategies. One of the biggest problems with security books is that, when you take out the OS configuration steps, most books offer little more than mundane pronouncements and recycled rules of thumb. Hacking Exposed is one of those rare books that actually show the reader how to think like an intruder. You’ll see the whole picture of the intrusion process from the top--a broad look at the phases of a network attack--to the bottom--examples of obscure Unix commands and discussions of specific hacking tools. And along the way, you’ll pick up valuable insights on how hackers think and how you can protect your network by thinking like a hacker. Hacking Exposed is also an impressive catalog of intrusion tools. You’ll find concise discussions of many tools, including information on how to obtain the tool and how to tell if the tool is currently deployed against you on your network. You’ll also find discussions of well known and lesser known attack methods, such as Trojan horses, buffer overflows, log doctoring, session hijacking, and SSL fraud. Hacking Exposed is divided into four parts. The first part, "Casing the Establishment," describes the footprinting, scanning, and enumeration phases, in which the intruder compiles a detailed map of the target network, including IP addresses, open ports, and relevant network resources. Part II, "System Hacking," describes specific techniques for hacking Windows 95/98/ME, Windows NT, Windows 2000, Novell NetWare, and Unix systems. (Error! Hyperlink reference not valid.) Part III, "Network Hacking," examines topics such as default passwords, SNMP, firewalls, denial of service, and dial-up attacks. Part IV, "Software Hacking," covers remote control vulnerabilities, Web hacking, and several advanced techniques, such as tricks with root kits and imaging tools. The best part of Hacking Exposed is the details. How many security books have you read that told you to beware of Trojan horses and then didn’t offer any specifics on what Trojan horses are out there and what to do about them? Hacking Exposed names at least a dozen specific Trojan horse programs currently operating on Windows, NetWare, and Unix systems. You’ll even find screen captures, URLs, and detection tips for each of the Trojans. This book shows clearly why you can’t assume anything is secure. You’ll learn tricks for compromising "secure" channel protocols such as SSL, IPSec, and PPTP. The details on Windows hacks are a particularly useful part of the book. You’ll learn about Registry hacks, remote access exploits, port redirection, and privilege escalation in Windows. If you ever felt inclined to believe Microsoft’s official version of Windows security, you’ll be interested in what the authors have to say about disabling auditing, clearing the Event Log, and hiding NTFS file resources. As one who has worked with computer books for many years, I can only imagine that Hacking Exposed must have evoked some secret envy from other publishers. This same book has been planned many times in many conference rooms throughout the publishing world, but in the end, it always comes down to the authors. You need creative and experienced authors with lots of energy to deliver this kind of detail and vision. If you spend enough time with Hacking Exposed, you could probably learn enough to start hacking networks yourself, although anyone else who has the book could probably learn enough to stop you. The fact is, if you really want to protect your network, you’ll need more information than any one book can hold. But if you want a head start on keeping your network safe, make sure Hacking Exposed is on your bookshelf. (Unix Review )