Hack proofing your network
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing.
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. ; [Great Britain] :
Syngress
c2002.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627948806719 |
Tabla de Contenidos:
- Cover; Table of Contents; Foreword v 1.0; Foreword v 1.5; Chapter 1 How To Hack; Chapter 2 The Laws of Security; Chapter 3 Classes of Attack; Chapter 4 Methodology; Chapter 5 Diffing; Chapter 6 Cryptography; Chapter 7 Unexpected Input; Chapter 8 Buffer Overflow; Chapter 9 Format Strings; Chapter 10 Sniffing; Chapter 11 Session Hijacking; Chapter 12 Spoofing: Attacks on Trusted Identity; Chapter 13 Tunneling; Chapter 14 Hardware Hacking; Chapter 15 Viruses, Trojan Horses, and Worms; Chapter 16 IDS Evasion; Chapter 17 Automated Security Review and Attack Tools
- Chapter 18 Reporting Security ProblemsIndex; Related Titles