Cargando…

Security warrior /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Peikari, Cyrus
Otros Autores: Chuvakin, Anton
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Beijing ; Sebastopol, CA : O'Reilly & Associates, ©2004.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • pt. I. Software Cracking
  • 1. Assembly Language
  • 2. Windows Reverse Engineering
  • 3. Linux Reverse Engineering
  • 4. Windows CE Reverse Engineering
  • 5. Overflow Attacks
  • pt. II. Network Stalking
  • 6. TCP/IP Analysis
  • 7. Social Engineering
  • 8. Reconnaissance
  • 9. OS Fingerprinting
  • 10. Hiding the Tracks
  • pt. III. Platform Attacks
  • 11. Unix Defense
  • 12. Unix Attacks
  • 13. Windows Client Attacks
  • 14. Windows Server Attacks
  • 15. SOAP XML Web Services Security
  • 16. SQL Injection
  • 17. Wireless Security
  • pt. IV. Advanced Defense
  • 18. Audit Trail Analysis
  • 19. Intrusion Detection Systems
  • 20. Honeypots
  • 21. Incident Response
  • 22. Forensics and Antiforensics
  • pt. V. Appendix
  • App. Useful SoftICE Commands and Breakpoints.