
Counter Hack Reloaded
A Step-by-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis, Tom Liston - Collection Security
Résumé
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.
For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.
Important features of this new edition include
- All-new "anatomy-of-an-attack" scenarios and tools
- An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more
- Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking"
- New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit
- New information on dangerous, hard-to-detect, kernel-mode rootkits
L'auteur - Edward Skoudis
Edward Skoudis is Vice President of Security Strategy for Predictive Systems, a leading independent infrastructure network consulting company, helping global enterprises and service providers harness the power of network technology. His specialty is identifying and resolving security vulnerabilities in UNIX, Windows, firewall architectures, and Web servers. Skoudis is a frequent speaker at major security conferences such as SANS and has demonstrated hacker techniques for the United States Senate.
L'auteur - Tom Liston
Tom Listen is a senior analyst for the Washington, D.C.-based information security consulting firm Intelguardians, LLC. He is the author of the popular open source network tarpit, LaBrea, as well as a handler for the SANS Institute's Internet Storm Center (ISC).
Sommaire
- Foreword
- Preface Reloaded
- About the Authors
- Introduction
- Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book
- Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book
- Windows NT/2000/XP/2003 Overview: Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book
- Phase 1: Reconnaissance
- Phase 2: Scanning
- Phase 3: Gaining Access Using Application and Operating System Attacks
- Phase 3: Gaining Access Using Network Attacks
- Phase 3: Denial-of-Service Attacks
- Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits... Oh My!
- Phase 5: Covering Tracks and Hiding
- Putting It All Together: Anatomy of an Attack
- The Future, References, and Conclusions
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Edward Skoudis, Tom Liston |
Collection | Security |
Parution | 16/01/2006 |
Édition | 2eme édition |
Nb. de pages | 748 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 1087g |
Intérieur | Noir et Blanc |
EAN13 | 9780131481046 |
ISBN13 | 978-0-13-148104-6 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet