Hacking Exposed - 2nd Edition

本书从攻击者的角度深入探讨了操作系统、应用及网络设备的安全漏洞,并提供了防范措施。内容覆盖Windows、Unix等系统的安全弱点及电话设备、路由器、防火墙的攻防策略。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

 Description: Author(s): Joel Scambray, Stuart MCClure..| Type: Hacking, Networking & Network Security | Pdf | English | Size: 7 Mb Excellent book for the beginners–> A lot of computer-security textbooks approach the subject from a defensive point of view. “Do this, and probably you’ll survive a particular kind of attack,” they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle… This book tell you about Security vulnerabilities of operating systems, applications, and network devices, Administrative procedures that will help defeat them, Techniques for hacking Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Novell NetWare, and Unix, Strategies for breaking into (or bringing down) telephony devices, routers, and firewalls.. Book Description: When a tree falls in the forest and no one is around to hear it, it certainly makes a sound. But if a computer network has a security vulnerability and no one knows about it, is it insecure? Only the most extreme Berkeleian idealist might argue against the former, but the latter is not nearly so obvious. A network with a security vulnerability is insecure to those who know about the vulnerability.If noone knows about it—if it is literally a vulnerability that has not been discovered—then the network is secure. If one person knows about it, then the network is insecure to him but secure to everyone else. If the network equipment manufacturer knows about it…if security researchers know about it…if the hacking community knows about it the insecurity of the network increasesas news of the vulnerability gets out. Or does it? The vulnerability exists, whether or not anyone knows about it.Publishing a vulnerability does not cause the network to be insecure. To claim that would be confusing knowledge about a thing with the thing itself. Publishing increases the likelihood that an attacker will use the vulnerability, but not the severity of the vulnerability. Publishing also increases the likelihood that people can defend against the vulnerability. Just as an attacker can’t exploit a vulnerability he does not know about, a defender can’t protect against a vulnerability he does not know about. So if keeping vulnerabilities secret increases security, it does so in a fragile way. Keeping vulnerabilities secret only works as long as they remain secret—but everything about information works toward spreading information. Some people spread secrets accidentally; others spread them on purpose. Sometimes secrets are re-derived by someone else. And once a secret is out, it can never be put back. TABLE OF CONTENT: Chapter 01 - Footprinting Chapter 02 - Scanning Chapter 03 - Enumeration Chapter 04 - Hacking Windows 95/98 and ME Chapter 05 - Hacking Windows NT Chapter 06 - Hacking Windows 2000 Chapter 07 - Novell NetWare Hacking Chapter 08 - Hacking UNIX Chapter 09 - Dial-Up, PBX, Voicemail, and VPN Hacking Chapter 10 - Network Devices Chapter 11 - Firewalls Chapter 12 - Denial of Service (DoS) Attacks Chapter 13 - Remote Control Insecurities Chapter 14 - Advanced Techniques Chapter 15 - Web Hacking Chapter 16 - Hacking the Internet User Appendix A - Ports Appendix B - Top 14 Security Vulnerabilities Appendix C - About the Companion Web Site http://www.ziddu.com/download.php?uid=Z62gnJ2uZqyanOKnZqqhkZSmY6uZnZuu6 http://w15.easy-share.com/14535791.html
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值