Hack proofing your network

The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing.

Bibliographic Details
Other Authors: Ahmad, David R. Mirza (-), Russell, Ryan, 1969-
Format: eBook
Language:Inglés
Published: Rockland, Mass. ; [Great Britain] : Syngress c2002.
Edition:2nd ed
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627948806719
Description
Summary:The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing.
Item Description:Previous ed.: 2000.
Includes index.
Physical Description:1 online resource (825 p.)
ISBN:9781281222695
9780080478166