HACKERS BEWARE: Defending your Network from the Wiley Hacker

This book gives you an insight into hackers and how to protect against them. By understanding how attacks work and what a hacker does to compromise a machine, a company can properly protect itself. The methods employed by attackers in exploits such as gaining access, simplifying gaining access, taking a system offline and desensitising sensitive information are discussed in detail. There are chapters on: information-gathering, spoofing (altering your identity), session hijacking (taking over an existing session to bypass a password), 'denial of service' attacks (which prevent people accessing your service), buffer overflow attacks (when an attacker attempts to store too much information), password security and password crackers, specific exploits for Unix, NT, how an attacker preserves access to a system, , covering tracks, and the top 10 exploits for a company that is connected to the internet to fix. The appendix contains useful urls for information on hacking and security
Download from: Ziddu | Hotfile | Mediafire

Không có nhận xét nào:

Đăng nhận xét