Hackers Beware

Front Cover
Sams Publishing, 2002 - Computers - 778 pages
4 Reviews

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

 

What people are saying - Write a review

User Review - Flag as inappropriate

I give this rating a 2
HACKERS BEWARE Should also show how Pokemon Hackers hack illegally yo.

User Review - Flag as inappropriate

this is a good book..
i got useful information for taking a seminar in my accadamic study..

Contents

I
1
II
2
III
3
IV
12
V
14
VI
18
VIII
19
IX
20
LXIX
316
LXX
334
LXXI
335
LXXIII
345
LXXIV
347
LXXV
348
LXXVI
352
LXXVII
354

XI
21
XII
23
XIII
35
XIV
36
XV
51
XVI
60
XVII
62
XVIII
63
XIX
64
XX
89
XXI
90
XXII
102
XXIII
103
XXIV
104
XXVI
140
XXVII
141
XXVIII
142
XXIX
143
XXX
144
XXXI
147
XXXII
151
XXXIII
152
XXXIV
172
XXXV
173
XXXVI
175
XXXVII
177
XXXVIII
178
XXXIX
179
XL
180
XLI
182
XLII
227
XLIII
229
XLIV
235
XLV
238
XLVI
241
XLVII
243
XLVIII
244
XLIX
245
L
248
LII
249
LIII
250
LV
280
LVI
282
LVII
283
LVIII
284
LIX
285
LX
286
LXI
288
LXII
291
LXIII
298
LXIV
309
LXV
311
LXVI
312
LXVII
313
LXXVIII
375
LXXIX
377
LXXX
382
LXXXI
383
LXXXII
384
LXXXIII
386
LXXXIV
387
LXXXV
410
LXXXVI
411
LXXXVII
412
LXXXVIII
477
LXXXIX
479
XCI
480
XCII
483
XCIII
491
XCIV
493
XCV
494
XCVI
542
XCVII
543
XCVIII
544
XCIX
548
C
553
CI
579
CII
581
CIII
582
CIV
604
CV
605
CVII
606
CVIII
612
CIX
621
CX
636
CXI
645
CXII
660
CXIII
671
CXIV
684
CXV
689
CXVI
691
CXVII
692
CXVIII
706
CXIX
708
CXXI
709
CXXII
710
CXXIII
715
CXXIV
717
CXXV
718
CXXVI
719
CXXVII
723
CXXVIII
724
CXXIX
729
CXXX
731
CXXXI
736
CXXXII
739
CXXXIII
749
Copyright

Other editions - View all

Common terms and phrases

References to this book

All Book Search results »

About the author (2002)

Eric Cole has worked in the information security arena for over 10 years. He is certified as a CISSP, MCSE and CCNA. Eric is very involved with the SANS Institute. He is in charge of the SANS Level One notebook, an instructor of hacking courses, and a member of the CVE (Common Vulnerabilities and Exposure) editorial board. Eric has extensive experience in the security and hacking area and devotes a lot of time to performing penetration testing for various clients. These clients range from banks, to hospitals, to health care providers, to large construction companies. Eric has also spent several years at the CIA performing security testing and red teaming. He is currently an adjunct professor at Georgetown University and has taught at NYIT.

Bibliographic information