Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)

Author(s)

Best way to secure your network? Break in! And that's exactly what InfoWorld security watch columnists Stuart McClure and Joel Scambray plus Extreme Hacking instructor George Kurtz show you how to do in Hacking Exposed: Network Security Secrets & Solutions. Arming you with a hacker's arsenal,they help you pinpoint vulnerable areas and apply effective security countermeasures in UNIX

(including Linux),Windows NT/95/98,and Novell networks. You'll discover the "InfoWorld Security Sweet 16" the top 16 hacks the authors themselves use to test systems and the top 15 security flaws that commonly afflict networks. In no time you'll learn how to. . .

*Repair e-mail and Web security holes

*Find and eliminate back doors,Trojan horses,viruses,and buffer overflows

*Recognize exposures from dial-up modems,modem pools,and RAS servers

*Locate and scan for vulnerable systems using Whois,Domain Name System queries,Ping sweeps,Port scans,and OS detection

*Crack accounts and passwords,escalate privilege,and exploit trusts

*And much,much more.

It's 1 a. m. . . Do You Know Who's on Your Network? Defend your network against the sneakiest hacks and latest attacks! In this must-have handbook,security experts Stuart McClure,Joel Scambray,and George Kurtz give you the full scoop on some of the most highly publicized and insidious break-ins - and show you how to implement bulletproof security on your own system. All aspects of network security are included - from informational scans and probes to password vulnerabilities,dialup networking insecurities,buffer overflows,web and email insecurities,trojans,and back doors. Hacking Exposed: Network Security Secrets &Solutions covers all security,auditing,and intrusion detection procedures for UNIX (including Linux),Windows NT/95/98,and Novell networks.

Learn to: Find,exploit,and apply countermeasures for security holes in UNIX,Linux,Windows NT/95/98,and Novell networks.

Repair email and web security holes (CGI,Perl,ASP,browsers,and hostile mobile code).

Understand how back channels and port redirection are used to circumvent firewalls.

Locate and scan for vulnerable systems using Whois,Domain Name System queries,Ping Sweeps,Port scans,and OS detection.

Enumerate users,groups,shares,file systems,and services with no authentication. Crack accounts and passwords,escalate privilege,and exploit trusts.

Find and eliminate back doors,Trojan horses,viruses,and buffer overflows.

Implement auditing and intrusion detection solutions.

Recognize vulnerabilities from dialup modems,modem pools,and RAS servers.

Name in long format: Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)
ISBN-10: 0072121270
ISBN-13: 9780072121278
Book pages: 484
Book language: en
Edition: 1
Binding: Paperback
Publisher: Computing Mcgraw-Hill
Dimensions: Height: 9.25 Inches, Length: 1.5 Inches, Weight: 2.20021337476 Pounds, Width: 7.75 Inches

Related Books