Hackers Beware

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do...

Full description

Bibliographic Details
Main Author: Cole, Eric
Format: eBook
Language:English
Published: Sams 2001
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 01920nmm a2200313 u 4500
001 EB001923185
003 EBX01000000000000001086087
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
100 1 |a Cole, Eric 
245 0 0 |a Hackers Beware  |c Cole, Eric 
250 |a 1st edition 
260 |b Sams  |c 2001 
300 |a 800 pages 
653 |a Pirates informatiques 
653 |a Sécurité informatique 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Hackers / fast 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Made available through: Safari, an O'Reilly Media Company 
776 |z 9780735710092 
776 |z 0735710090 
856 4 0 |u https://learning.oreilly.com/library/view/~/0735710090/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that"--The techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it