Chained Exploits: Advanced Hacking Attacks from Start to Finish

本书深入探讨了当前难以防御的连锁攻击技术,通过详实的例子展示了真实世界中的攻击策略,覆盖了从无线网络到社会工程学的全方位攻击路径,并介绍了有效的防御措施。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.youkuaiyun.com/topmvp - topmvp
  Channel
 Data Warehouse Sql Language
 ACCESS FileMaker
 Data Mining Database Design
 Database General MySql
 Oracle SQL Server 2005
 SQL Server 2008 DB2
 Sql Server Windows 2003
 Windows Server 2008 Linux
 Windows Unix
 Windows Vista OS General
 Flash Flex
 3D Animation PhotoShop
 SCM Project
 Software Test Object Oriented
 MDA CMM CMMI ISO
 UML Service Oriented
 Patterns Extreme Programming
 Requirement Aspect Oriented
 Six Sigma Excel
 SAP Google
 Apple Exchange Server
 VPN Wireless
 IPv6 VoIP
 Mobile C C++
 Spring Ado.Net
 Programming General Dot Net
 COM DCOM Vb Vb.Net
 C# CSharp Hibernate
 Java Delphi
 Eclipse Swing
 J2ME DirectX
 Algorithms OpenGL
 Visual Studio Web Services
 J2EE Crystal Reports
 JDBC WebLogic
 Grid Computing WPF
 Jakarta DreamWeaver
 Apache Asp
 Web Design Adobe AIR
 Web General Asp.Net
 HTML JSP
 Java Script SharePoint
 VBScript Ajax
 Python Ruby
 Perl CSS
 XML XSLT PHP
 Game Programming Game General
 
Chained Exploits: Advanced Hacking Attacks from Start to Finish
[LanguageEnglish ] [Channel: Security ] 
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
The complete guide to todays hard-to-defend chained attacks: performing them and preventing them
Nowadays, its rare for malicious hackers to rely on just one exploit or tool; instead, they use chained exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most dont cover them at all. Now theres a book that brings together start-to-finish information about todays most widespread chained exploitsCboth how to perform them and how to prevent them.
Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use todays most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.
Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce todays most effective countermeasures both technical and human. Coverage includes:
*Constructing convincing new phishing attacks
*Discovering which sites other Web users are visiting
*Wreaking havoc on IT security via wireless networks
*Disrupting competitors Web sites
*PerformingCand preventingCcorporate espionage
*Destroying secure files
*Gaining access to private healthcare records
*Attacking the viewers of social networking pages
*Creating entirely new exploits

http://rapidshare.com/files/228528426/032149881X.rar
http://depositfiles.com/files/x1wvp484x
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值