Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Product Detail
Product Information   |  Other Product Information

Product Information
Counter Hack Reloaded: Step-by-Step Guide to Computer Attacks and Effective Defenses
Counter Hack Reloaded: Step-by-Step Guide to Computer Attacks and Effective Defenses
Author: Skoudis, Edward
Edition/Copyright: 2ND 06
ISBN: 0-13-148104-5
Publisher: Prentice Hall, Inc.
Type: Paperback
Used Print:  $63.75
Other Product Information
Summary
Table of Contents
 
  Summary

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security experts Ed Skoudis and Tom Liston have thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.

Features

  • Major revision to the best-selling, step-by-step guide to defending against hacker intrusions--more than 45% new material.
  • Contains more than 45% new material including coverage devoted to the steps of scanning, gaining and maintaining access, and preventing detection
  • All new scenarios in the anatomy of an attack chapter and tools to battle them
  • Author is a huge name in security. The first edition is touted as "outstanding" and the "best of its kind"

New To This Edition

  • Important features of this new edition include
  • All-new "anatomy-of-an-attack" scenarios and tools
  • All-new section on wireless hacking: wardriving, warchalking, WEP attacks, and more
  • Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking"
  • New coverage of tools for gaining access, including uncovering Windows vulnerabilities with Mediasploit
  • New information on dangerous, hard-to-detect, kernel-level rootkits
 
  Table of Contents
Introduction p. 1
Networking overview : pretty much everything you need to know about networking to follow the rest of this book p. 25
Linux and UNIX overview : pretty much everything you need to know about Linux and UNIX to follow the rest of this book p. 91
Windows NT/2000/XP/2003 overview : pretty much everything you need to know about Windows to follow the rest of this book p. 127
Phase 1 : reconnaissance p. 183
Phase 2 : scanning p. 239
Phase 3 : gaining access using application and operating system attacks p. 339
Phase 3 : gaining access using network attacks p. 439
Phase 3 : denial-of-service attacks p. 513
Phase 4 : maintaining access : Trojans, backdoors, and rootkits ... oh my! p. 547
Phase 5 : covering tracks and hiding p. 627
Putting it all together : anatomy of an attack p. 671
The future, references, and conclusions p. 711
Table of Contents provided by Blackwell. All Rights Reserved.
 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved