HOME > 상세정보

상세정보

Hack attacks revealed : a complete reference with custom security hacking toolkit

Hack attacks revealed : a complete reference with custom security hacking toolkit

자료유형
단행본
개인저자
Chirillo, John, 1970-.
서명 / 저자사항
Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo.
발행사항
New York :   Wiley,   2001.  
형태사항
xvi, 944 p. : ill. ; 23 cm.+ 1 CD-ROM (4 3/4 in.).
ISBN
0471189928 (electronic bk.) 9780471189923 (electronic bk.) 047141624X (pbk. : alk. paper) 9780471416241 (pbk. : alk. paper)
일반주기
"Wiley Computer Publishing."  
서지주기
Includes bibliographical references (p. 927-928) and index.
일반주제명
Computer security. Computer networks -- Security measures.
000 01507camuu2200373 a 4500
001 000045563801
005 20091204125913
008 010122s2001 nyua b 001 0 eng
010 ▼a 2001017664
020 ▼a 0471189928 (electronic bk.)
020 ▼a 9780471189923 (electronic bk.)
020 ▼a 047141624X (pbk. : alk. paper)
020 ▼a 9780471416241 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm49569576
035 ▼a (OCoLC)49569576
035 ▼a (KERIS)REF000010409854
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b C48 2001
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b C541hc
100 1 ▼a Chirillo, John, ▼d 1970-.
245 1 0 ▼a Hack attacks revealed : ▼b a complete reference with custom security hacking toolkit / ▼c John Chirillo.
260 ▼a New York : ▼b Wiley, ▼c 2001.
300 ▼a xvi, 944 p. : ▼b ill. ; ▼c 23 cm.+ ▼e 1 CD-ROM (4 3/4 in.).
500 ▼a "Wiley Computer Publishing."
504 ▼a Includes bibliographical references (p. 927-928) and index.
650 0 ▼a Computer security.
650 0 ▼a Computer networks ▼x Security measures.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C541hc 등록번호 121187080 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.

New feature

Beat hackers at their own game - The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed

Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you'll discover:

  • The hacker's perspective on networking protocols and communication technologies
  • A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
  • Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
  • Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks



정보제공 : Aladin

목차

Acknowledgments.

A Note to the Reader.

Introduction.

IN THE BEGINNING.

Understanding Communication Protocols.

NetWare and NetBIOS Technology.

PUTTING IT ALL TOGETHER.

Understanding Communication Mediums.

UNCOVERING VULNERABILITIES.

Intuitive Intermission: A Little Terminology.

Well-Known Ports and Their Services.

Discovery and Scanning Techniques.

HACKING SECURITY HOLES.

Intuitive Intermission: A Hacker's Genesis.

The Hacker's Technology Handbook.

Hacker Coding Fundamentals.

Port, Socket, and Service Vulnerability Penetrations.

VULNERABILITY HACKING SECRETS.

Intuitive Intermission: A Hacker's Vacation.

Gateways and Routers and Internet Server Daemons.

Operating Systems.

Proxies and Firewalls.

THE HACKER'S TOOLSBOX.

Intuitive Intermission: The Evolution of a Hacker.

TigerSuite: The Complete Internetworking Security Toolbox.

Appendix A: IP Reference Table and Subnetting Charts.

Appendix B: Well-Known Ports and Services.

Appendix C: All-Inclusive Ports and Services.

Appendix D: Detrimental Ports and Services.

Appendix E: What's on the CD.

Appendix F: Most Common Viruses.

Appendix G: Vendor Codes.

Glossary.

References.

Index.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)