tailieunhanh - Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network
Maximum Security, provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems. | Maximum Security A Hacker s Guide to Protecting Your Internet Site and Network Table of Contents Introduction I Setting the Stage Chapter 1 - Why Did I Write This Book Chapter 2 - How This Book Will Help You Chapter 3 - Hackers and Crackers Chapter 4 - Just Who Can Be Hacked Anyway II Understanding the Terrain Chapter 5 - Is Security a Futile Endeavor Chapter 6 - A Brief Primer on TCP IP Chapter 7 - Birth of a Network The Internet Chapter 8 - Internet Warfare III Tools Chapter 9 - Scanners Chapter 10 - Password Crackers Chapter 11 - Trojans Chapter 12 - Sniffers Chapter 13 - Techniques to Hide One s Identity Chapter 14 - Destructive Devices IV Platforms and Security Chapter 15 - The Hole Chapter 16 - Microsoft Chapter 17 - UNIX The Big Kahuna Chapter 18 - Novell Chapter 19 - VAX VMS Chapter 20 - Macintosh Chapter 21 - Plan 9 from Bell Labs V Beginning at Ground Zero Chapter 22 - Who or What Is Root Chapter 23 - An Introduction to Breaching a Server Internally Chapter 24 - Security Concepts VI The Remote Attack Chapter 25 - The Remote Attack Chapter 26 - Levels of Attack Chapter 27 - Firewalls Chapter 28 - Spoofing Attacks Chapter 29 - Telnet-Based Attacks Chapter 30 - Language Extensions and Security VII The Law Chapter 31 - Reality Bytes Computer Security and the Law VIII Appendixes Appendix A - How to Get More Information Appendix B - Security Consultants Appendix C - A Hidden Message About the Internet Appendix D - What s on the CD-ROM Copyright Angel722 Computer Publishing. All rights reserved. Maximum Security A Hacker s Guide to Protecting Your Internet Site and Network Dedication This book is dedicated to Michelle whose presence has rendered me a prince among men. Acknowledgments My acknowledgments are brief. First I would like to acknowledge the folks at Sams particularly Randi Roger Scott Meyers Mark Taber Blake Hall Eric Murray Bob Correll and Kate Shoup. Without them my work would resemble a tangled horrible mess. They are an awesome editing team and .
đang nạp các trang xem trước