Security Warrior : Know Your Enemy by Anton Chuvakin and Cyrus Peikari (2004, Trade Paperback)

Bargain Book Stores (1134290)
99,2% de votos positivos
Precio:
USD37,19
Aproximadamente32,61 EUR
+ USD10,92 de envío
Entrega prevista: jue. 14 ago. - mar. 2 sep.
Devoluciones:
No admite devoluciones pero está respaldado por la Garantía al cliente de eBay.
Estado:
Nuevo
Format: Paperback or Softback. Your Privacy. Condition Guide. Item Availability.

Acerca de este artículo

Product Identifiers

PublisherO'reilly Media, Incorporated
ISBN-100596005458
ISBN-139780596005450
eBay Product ID (ePID)5985230

Product Key Features

Number of Pages556 Pages
Publication NameSecurity Warrior : Know Your Enemy
LanguageEnglish
Publication Year2004
SubjectNetworking / Intranets & Extranets, Networking / General, Security / General
TypeTextbook
Subject AreaComputers
AuthorAnton Chuvakin, Cyrus Peikari
FormatTrade Paperback

Dimensions

Item Height1 in
Item Weight27.1 Oz
Item Length9.2 in
Item Width7 in

Additional Product Features

Intended AudienceScholarly & Professional
LCCN2004-300981
IllustratedYes
Table Of ContentDedication Preface Part I: Software Cracking Chapter 1: Assembly Language Chapter 2: Windows Reverse Engineering Chapter 3: Linux Reverse Engineering Chapter 4: Windows CE Reverse Engineering Chapter 5: Overflow Attacks Part II: Network Stalking Chapter 6: TCP/IP Analysis Chapter 7: Social Engineering Chapter 8: Reconnaissance Chapter 9: OS Fingerprinting Chapter 10: Hiding the Tracks Part III: Platform Attacks Chapter 11: Unix Defense Chapter 12: Unix Attacks Chapter 13: Windows Client Attacks Chapter 14: Windows Server Attacks Chapter 15: SOAP XML Web Services Security Chapter 16: SQL Injection Chapter 17: Wireless Security Part IV: Advanced Defense Chapter 18: Audit Trail Analysis Chapter 19: Intrusion Detection Systems Chapter 20: Honeypots Chapter 21: Incident Response Chapter 22: Forensics and Antiforensics Part V: Appendix Appendix A: Useful SoftICE Commands and Breakpoints Colophon
SynopsisWhen it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the ......, When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands., When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle."Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability."Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands., When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
LC Classification NumberTK5105.59.P44985

Todos los anuncios de este producto

¡Cómpralo ya!
Cualquier estado
Nuevo
Usado
Todavía no hay valoraciones ni opiniones.
Sé el primero en escribir una opinión.