Normal view MARC view ISBD view

The hacker's handbook the strategy behind breaking into and defending networks

by Young, Susan; Aitel, Dave (jt.auth).
Publisher: Boca Raton Auerbach Publications 2003Description: 896 p.ISBN: 0849308887; 9780849308888.Subject(s): Computer networks-Security measures Computer networks-Access control Computer hackersSummary: The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Tags from this library: No tags from this library for this title.
    average rating: 0.0 (0 votes)
Item type Location Call number Status Date due Barcode Item holds
Reference
Central Library AIOU Islamabad

Allama Iqbal Open University

Central Library

Reference
005.8 YOH (Browse shelf) Not for loan 108217
Total holds: 0

HB

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

There are no comments for this item.

Log in to your account to post a comment.

Copyright © 2023, All rights reserved
AIOU, Islamabad Pakistan.
Ph#: | 051-9250040, 051-9571682, 051-9571695 Fax: | 051-9250146 Email| documentdelivery@aiou.edu.pk Web| ”Central Library”