Hack proofing your network
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing.
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. ; [Great Britain] :
Syngress
c2002.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627948806719 |
Sumario: | The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing. |
---|---|
Notas: | Previous ed.: 2000. Includes index. |
Descripción Física: | 1 online resource (825 p.) |
ISBN: | 9781281222695 9780080478166 |