| 000 | 01507camuu2200373 a 4500 | |
| 001 | 000045563801 | |
| 005 | 20091204125913 | |
| 008 | 010122s2001 nyua b 001 0 eng | |
| 010 | ▼a 2001017664 | |
| 020 | ▼a 0471189928 (electronic bk.) | |
| 020 | ▼a 9780471189923 (electronic bk.) | |
| 020 | ▼a 047141624X (pbk. : alk. paper) | |
| 020 | ▼a 9780471416241 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm49569576 | |
| 035 | ▼a (OCoLC)49569576 | |
| 035 | ▼a (KERIS)REF000010409854 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b C48 2001 |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b C541hc | |
| 100 | 1 | ▼a Chirillo, John, ▼d 1970-. |
| 245 | 1 0 | ▼a Hack attacks revealed : ▼b a complete reference with custom security hacking toolkit / ▼c John Chirillo. |
| 260 | ▼a New York : ▼b Wiley, ▼c 2001. | |
| 300 | ▼a xvi, 944 p. : ▼b ill. ; ▼c 23 cm.+ ▼e 1 CD-ROM (4 3/4 in.). | |
| 500 | ▼a "Wiley Computer Publishing." | |
| 504 | ▼a Includes bibliographical references (p. 927-928) and index. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 C541hc | 등록번호 121187080 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.
New feature
Beat hackers at their own game - The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.
In this highly provocative work, you'll discover:
- The hacker's perspective on networking protocols and communication technologies
- A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
- Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
- Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks
정보제공 :
목차
Acknowledgments.
A Note to the Reader.
Introduction.
IN THE BEGINNING.
Understanding Communication Protocols.
NetWare and NetBIOS Technology.
PUTTING IT ALL TOGETHER.
Understanding Communication Mediums.
UNCOVERING VULNERABILITIES.
Intuitive Intermission: A Little Terminology.
Well-Known Ports and Their Services.
Discovery and Scanning Techniques.
HACKING SECURITY HOLES.
Intuitive Intermission: A Hacker's Genesis.
The Hacker's Technology Handbook.
Hacker Coding Fundamentals.
Port, Socket, and Service Vulnerability Penetrations.
VULNERABILITY HACKING SECRETS.
Intuitive Intermission: A Hacker's Vacation.
Gateways and Routers and Internet Server Daemons.
Operating Systems.
Proxies and Firewalls.
THE HACKER'S TOOLSBOX.
Intuitive Intermission: The Evolution of a Hacker.
TigerSuite: The Complete Internetworking Security Toolbox.
Appendix A: IP Reference Table and Subnetting Charts.
Appendix B: Well-Known Ports and Services.
Appendix C: All-Inclusive Ports and Services.
Appendix D: Detrimental Ports and Services.
Appendix E: What's on the CD.
Appendix F: Most Common Viruses.
Appendix G: Vendor Codes.
Glossary.
References.
Index.
정보제공 :
