000 01826 a2200181 4500
020 _a0849308887
020 _a9780849308888
082 0 4 _a005.8
_bYOH
100 1 _aYoung, Susan
_9728
245 1 4 _aThe hacker's handbook
_bthe strategy behind breaking into and defending networks
_cSusan Young
260 _aBoca Raton
_bAuerbach Publications
_c2003
300 _a896 p.
500 _aHB
520 _aThe Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
650 4 _aComputer networks-Security measures
_aComputer networks-Access control
_aComputer hackers
_9244139
700 1 _aAitel, Dave (jt.auth)
_96074
942 _cBK
999 _c47330
_d47330