Description |
xxvii, 687 pages : illustrations ; 23 cm |
Contents |
Part I. Casing the establishment -- 1. Footprinting -- 2. Scanning -- 3. Enumeration -- Part II. System hacking -- 4. Hacking Windows -- Hacking Unix -- Part III. Infrastructure hacking -- 6. Remote connectivity and VoIP hacking -- 7. Network devices --8. Wireless hacking -- 9. Hacking hardware -- Part IV. Application and data hacking -- 10. Hacking code -- 11. Web hacking -- 12. Hacking the internet user -- Part V. Appendixes -- A. Ports -- B. Top 14 security vulnerabilities -- C. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks -- Index |
Summary |
"The original "Hacking Exposed" authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. "Hacking Exposed 6" applies the authors' internationally renowned computer security methodologies, technical rigor, and 'from-the-trenches' experience to make computer technology usage and deployments safer and more secure for businesses and consumers." - product description |
Notes |
Includes index |
Subject |
Computer networks -- Security measures.
|
|
Computer security.
|
|
Data protection.
|
Author |
Kurtz, George.
|
|
Scambray, Joel.
|
ISBN |
0071613749 (paperback) |
|
9780071613743 (paperback) |
|