Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Prentice Hall Professional Technical Reference,
2005.
|
Edición: | 2nd ed. |
Colección: | Radia Perlman series in computer networking and security.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Introduction
- Networking overview: pretty much everything you need to know about networking to follow the rest of this book
- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book
- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book
- Phase 1: reconnaissance
- Phase 2: scanning
- Phase 3: gaining access using application and operating system attacks
- Phase 3: gaining access using network attacks
- Phase 3: denial-of-service attacks
- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my!
- Phase 5: covering tracks and hiding
- Putting it all together: anatomy of an attack
- The future, references, and conclusions.