Hacking Exposed: Network Security Secrets and Solutions
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more!
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
ActiveX Admin Administrator allow application attackers Audit authentication browser buffer overflow bytes Chapter Cisco client command compromised configuration connection Countermeasure cracking create database default detection dial-up disable discussed domain enabled encryption enumeration example execute exploit filter firewall guessing hackers Hacking Exposed hash host ICMP Impact implementation installed interface Internet IP address IPSec kernel Linux listening login Microsoft NetBIOS NetBus netcat NetWare Network Security Secrets nmap operating system option packet password patch perform Popularity port scanning privileges protocol query Registry Risk Rating root rootkit router script Secrets and Solutions sendmail shell Simplicity sniffer SNMP ſº Solaris specific SYSKEY target system TCP/IP techniques telnet Terminal Server ToneLoc traffic UNIX username utility vulnerability wardialing Win 9x Windows NT
Information Security Best Practices: 205 Basic Rules
George L Stefanek
Limited preview - 2002
All Book Search results »
Stalking Crimes and Victim Protection: Prevention, Intervention, Threat ...
Joseph A. Davis
No preview available - 2001