• Slide 1 Title

    Click để xem thông tin nóng hổi. ...

  • Slide 2 Title

    Go to Blogger edit html and replace these slide 2 description with your own words. ...

  • Slide 3 Title

    Go to Blogger edit html and replace these slide 3 description with your own words. ...

  • Slide 4 Title

    Go to Blogger edit html and replace these slide 4 description with your own words. ...

  • Slide 5 Title

    Go to Blogger edit html and replace these slide 5 description with your own words. ...

mainpageads

Thứ Hai, 29 tháng 6, 2009

HACKERS BEWARE: Defending your Network from the Wiley Hacker

This book gives you an insight into hackers and how to protect against them. By understanding how attacks work and what a hacker does to compromise a machine, a company can properly protect itself. The methods employed by attackers in exploits such as gaining access, simplifying gaining access, taking a system offline and desensitising sensitive information are discussed in detail. There are chapters on: information-gathering, spoofing (altering your identity), session hijacking (taking over an existing session to bypass a password), 'denial of service' attacks (which prevent people accessing your service), buffer overflow attacks (when an attacker attempts to store too much information), password security and password crackers, specific exploits for Unix, NT, how an attacker preserves access to a system, , covering tracks, and the top 10 exploits for a company that is connected to the internet to fix. The appendix contains useful urls for information on hacking and security
Download from: Ziddu | Hotfile | Mediafire

Categories:

0 nhận xét:

Đăng nhận xét

Recent Posts

 
  • Blogroll

  • Consectetuer

  • Popular

  • Comments