Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
The Hack-Counter Hack Training Course
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

The Hack-Counter Hack Training Course

The Hack-Counter Hack Training Course

A Network Security Seminar from Ed Skoudis

Edward Skoudis

106 pages, parution le 08/07/2002

Résumé

The Hack Counter-Hack Training Course

  • Watch, listen, learn-as leading Network security expert Ed Skoudis walks you through today's most dangerous attacks, and demonstrates your best countermeasures!
  • Covers the five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
  • Over 4 hours of expert digital video instruction, detailed explanations, and hands-on exercises-a complete learning experience
  • Up-to-the-minute security solutions for both Linux and Windows environments
  • By the security expert who demonstrated hacking to the U.S. Senate!

SECURE YOUR NETWORK -- RIGHT NOW!
Stop struggling with dense textbooks! Watch, listen, and learn the key security techniques you need to know to protect your network and data right now! Ed Skoudis, the top network security consultant who demonstrated hacking to the U.S. Senate, will show you exactly how hackers attack your network-and how to fix your vulnerabilities before they can! In over four hours of digital videos straight from Skoudis' desktop, you'll learn crucial skills for protecting both Windows and Linux systems, and responding to today's most dangerous attacks-step-by-step. Network security has never been this visual-or this easy!

A DIGITAL SEMINAR FROM ONE OF THE WORLD'S TOP NETWORK SECURITY EXPERTS!
Master Network security the easy way, by watching digital videos straight from the desktop of expert Network Security consultant Ed Skoudis-more than four hours of personal instruction in all!

Covers essential and advanced Network Security techniques! Practical coverage includes Windows, Linux, and TCP/IP vulnerabilities, key hacker and defense tools, attacks, countermeasures, and more.

Based on the best-selling book from Ed Skoudis, Counter Hack!

You'll learn how to respond to every phase of the hacker's attack: reconnaissance, scanning, gaining and maintaining access, exploitation, and preventing detection. Skoudis presents in-depth descriptions of war dialers, port and firewall scanners, sniffers, IP spoofing, IP fragmentation, denial of service attacks -- plus specific actions you can take to protect yourself today!

BONUS!
Follow the course from start to finish using the customized print workbook containing all of Ed Skoudis' presentation slides!

Covers all this, and more...
All 5 phases of the hacker attack: reconnaissance, scanning, gaining access, maintaining access, and covering tracks Key hacker tools: Building and using your hacker tool analysis laboratory Real-world attacks and countermeasures: password cracking, buffer overflows, session hijacking, Trojan horses, backdoors, and more Windows and Linux: Practical techniques and tools for today's leading server environments

SPECIALLY DESIGNED FOR:
Anyone responsible for implementing or enhancing network security Webmasters and netadmins who want to master basic security techniques fast -- hands-on Experienced professionals seeking to update and strengthen their security skills Windows and Linux users

System Requirements

For Windows

  • Windows 98/NT4/2000/XP
  • Internet Explorer 5.5 (included) or higher
For Linux
  • RedHat® Linux 6.2 or higher
  • Netscape 4.76 - 4.79 (not included)
Hardware Requirements
  • 300 MHz processor or higher32 MB disk space/64 MB RAM (128 recommended)
  • CD-ROM drive and sound card support Supporting Applications Required
  • Adobe Acrobat Reader 5.0 (Windows version included)
  • Real Player® 8 Basic or higher (not included)

L'auteur - Edward Skoudis

Edward Skoudis is Vice President of Security Strategy for Predictive Systems, a leading independent infrastructure network consulting company, helping global enterprises and service providers harness the power of network technology. His specialty is identifying and resolving security vulnerabilities in UNIX, Windows, firewall architectures, and Web servers. Skoudis is a frequent speaker at major security conferences such as SANS and has demonstrated hacker techniques for the United States Senate.

Caractéristiques techniques

  PAPIER
Éditeur(s) Prentice Hall
Auteur(s) Edward Skoudis
Parution 08/07/2002
Nb. de pages 106
Format 18,5 x 24
Couverture Broché
Poids 410g
Intérieur Noir et Blanc
EAN13 9780130477293

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription