Security warrior /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Beijing ; Sebastopol, CA :
O'Reilly & Associates,
©2004.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Software Cracking
- 1. Assembly Language
- 2. Windows Reverse Engineering
- 3. Linux Reverse Engineering
- 4. Windows CE Reverse Engineering
- 5. Overflow Attacks
- pt. II. Network Stalking
- 6. TCP/IP Analysis
- 7. Social Engineering
- 8. Reconnaissance
- 9. OS Fingerprinting
- 10. Hiding the Tracks
- pt. III. Platform Attacks
- 11. Unix Defense
- 12. Unix Attacks
- 13. Windows Client Attacks
- 14. Windows Server Attacks
- 15. SOAP XML Web Services Security
- 16. SQL Injection
- 17. Wireless Security
- pt. IV. Advanced Defense
- 18. Audit Trail Analysis
- 19. Intrusion Detection Systems
- 20. Honeypots
- 21. Incident Response
- 22. Forensics and Antiforensics
- pt. V. Appendix
- App. Useful SoftICE Commands and Breakpoints.