A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: Am The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials Am A great addition to the bestselling qHack Proofing...q series Am Windows 2000 sales have surpassed those of Windows NT Am Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Am Unrivalled web support at firstname.lastname@example.orgAsymmetric keys, 167 Asymmetric signatures, 451a453 ATA/IDE hard drive specification, 644 Attack classes, 45 FAQs, ... See also Buffer overflow; Electrical circuit attacks; Format string; Glitch attacks; Housing; Mechanical attacks; ... 336 exploits, 124 file, 122, 195 research, 104a105 Call EDX, 272 Call instruction, 250 Call Register, 272a273 support, ... 392 BSD-based operation systems, 103 BSDI, 392 Buffer injection techniques, 268a269 Buffer overflow, 102, 106a110, 207, 243.
|Title||:||Hack Proofing Your Network 2E|
|Publisher||:||Syngress - 2002-03-26|