Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

Hack Attacks Revealed

Librairie Eyrolles - Paris 5e

Hack Attacks Revealed

Hack Attacks Revealed

A Complete Reference with Custom Security Hacking Toolkit

John Chirillo

944 pages, parution le 01/07/2001


Beat hackers at their own game — The world of a hacker revealed by a corporate hack master Hack Attacks Revealed Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box(r) system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage. In this highly provocative work, you'll discover:
  • The hacker's perspective on networking protocols and communication technologies
  • A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
  • Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
  • Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks


Target Audience
About the Author
Understanding Communication Protocols
NetBios vs. NetBEUI
Understanding Communication Mediums
Token Ring
Point-To-Point Links
Frame Relay
Uncovering Vulnerabilities
Common Port and Service Liabilities
Concealed Port and Service Liabilities
Site Scans
Hacking Security Holes
Intuitive Intermission Act II: A Hacker's Genesis
The Hackers' Technology Handbook
Port, Socket and Service Vulnerability Penetrations
Intuitive Intermission Act III: A Hacker's Vocation
Vulnerability Hacking Secrets
Intuitive Intermission Act IV: The Life and Death of a Hacker
The Hacker's Toolbox
The Complete Internetworking Security Toolbox
Appendix A: IP Reference Table and Subnetting Charts
Appendix B: Well-Known Ports and Services
Appendix C: All-Inclusive Ports and Services
Appendix D: Concealed Ports and Services
Appendix E: What's On the CD
Appendix F: The Underground Community

L'auteur - John Chirillo

JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Caractéristiques techniques

Éditeur(s) Wiley
Auteur(s) John Chirillo
Parution 01/07/2001
Nb. de pages 944
Format 19 x 23,5
Couverture Broché
Poids 1650g
Intérieur Noir et Blanc
EAN13 9780471416241


Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients 0 321 79 56 75
librairie française
Librairie française depuis 1925