Cargando…

Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Skoudis, Ed
Otros Autores: Liston, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
Edición:2nd ed.
Colección:Radia Perlman series in computer networking and security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Introduction
  • Networking overview: pretty much everything you need to know about networking to follow the rest of this book
  • Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book
  • Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book
  • Phase 1: reconnaissance
  • Phase 2: scanning
  • Phase 3: gaining access using application and operating system attacks
  • Phase 3: gaining access using network attacks
  • Phase 3: denial-of-service attacks
  • Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my!
  • Phase 5: covering tracks and hiding
  • Putting it all together: anatomy of an attack
  • The future, references, and conclusions.