Book description
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated, and performed. With the VMware® Workstation software package available on the downloadable resources, it uses virtua
Table of contents
- Front cover
- Preface
- Contents (1/2)
- Contents (2/2)
- Chapter 1. Preparation (1/13)
- Chapter 1. Preparation (2/13)
- Chapter 1. Preparation (3/13)
- Chapter 1. Preparation (4/13)
- Chapter 1. Preparation (5/13)
- Chapter 1. Preparation (6/13)
- Chapter 1. Preparation (7/13)
- Chapter 1. Preparation (8/13)
- Chapter 1. Preparation (9/13)
- Chapter 1. Preparation (10/13)
- Chapter 1. Preparation (11/13)
- Chapter 1. Preparation (12/13)
- Chapter 1. Preparation (13/13)
- Chapter 2. Banner Identification (1/5)
- Chapter 2. Banner Identification (2/5)
- Chapter 2. Banner Identification (3/5)
- Chapter 2. Banner Identification (4/5)
- Chapter 2. Banner Identification (5/5)
- Chapter 3. Target Enumeration (1/12)
- Chapter 3. Target Enumeration (2/12)
- Chapter 3. Target Enumeration (3/12)
- Chapter 3. Target Enumeration (4/12)
- Chapter 3. Target Enumeration (5/12)
- Chapter 3. Target Enumeration (6/12)
- Chapter 3. Target Enumeration (7/12)
- Chapter 3. Target Enumeration (8/12)
- Chapter 3. Target Enumeration (9/12)
- Chapter 3. Target Enumeration (10/12)
- Chapter 3. Target Enumeration (11/12)
- Chapter 3. Target Enumeration (12/12)
- Chapter 4. Scanning (1/10)
- Chapter 4. Scanning (2/10)
- Chapter 4. Scanning (3/10)
- Chapter 4. Scanning (4/10)
- Chapter 4. Scanning (5/10)
- Chapter 4. Scanning (6/10)
- Chapter 4. Scanning (7/10)
- Chapter 4. Scanning (8/10)
- Chapter 4. Scanning (9/10)
- Chapter 4. Scanning (10/10)
- Chapter 5. Sniffing Traffic (1/14)
- Chapter 5. Sniffing Traffic (2/14)
- Chapter 5. Sniffing Traffic (3/14)
- Chapter 5. Sniffing Traffic (4/14)
- Chapter 5. Sniffing Traffic (5/14)
- Chapter 5. Sniffing Traffic (6/14)
- Chapter 5. Sniffing Traffic (7/14)
- Chapter 5. Sniffing Traffic (8/14)
- Chapter 5. Sniffing Traffic (9/14)
- Chapter 5. Sniffing Traffic (10/14)
- Chapter 5. Sniffing Traffic (11/14)
- Chapter 5. Sniffing Traffic (12/14)
- Chapter 5. Sniffing Traffic (13/14)
- Chapter 5. Sniffing Traffic (14/14)
- Chapter 6. Spoofing (1/8)
- Chapter 6. Spoofing (2/8)
- Chapter 6. Spoofing (3/8)
- Chapter 6. Spoofing (4/8)
- Chapter 6. Spoofing (5/8)
- Chapter 6. Spoofing (6/8)
- Chapter 6. Spoofing (7/8)
- Chapter 6. Spoofing (8/8)
- Chapter 7. Brute Force (1/12)
- Chapter 7. Brute Force (2/12)
- Chapter 7. Brute Force (3/12)
- Chapter 7. Brute Force (4/12)
- Chapter 7. Brute Force (5/12)
- Chapter 7. Brute Force (6/12)
- Chapter 7. Brute Force (7/12)
- Chapter 7. Brute Force (8/12)
- Chapter 7. Brute Force (9/12)
- Chapter 7. Brute Force (10/12)
- Chapter 7. Brute Force (11/12)
- Chapter 7. Brute Force (12/12)
- Chapter 8. Vulnerability Scanning (1/31)
- Chapter 8. Vulnerability Scanning (2/31)
- Chapter 8. Vulnerability Scanning (3/31)
- Chapter 8. Vulnerability Scanning (4/31)
- Chapter 8. Vulnerability Scanning (5/31)
- Chapter 8. Vulnerability Scanning (6/31)
- Chapter 8. Vulnerability Scanning (7/31)
- Chapter 8. Vulnerability Scanning (8/31)
- Chapter 8. Vulnerability Scanning (9/31)
- Chapter 8. Vulnerability Scanning (10/31)
- Chapter 8. Vulnerability Scanning (11/31)
- Chapter 8. Vulnerability Scanning (12/31)
- Chapter 8. Vulnerability Scanning (13/31)
- Chapter 8. Vulnerability Scanning (14/31)
- Chapter 8. Vulnerability Scanning (15/31)
- Chapter 8. Vulnerability Scanning (16/31)
- Chapter 8. Vulnerability Scanning (17/31)
- Chapter 8. Vulnerability Scanning (18/31)
- Chapter 8. Vulnerability Scanning (19/31)
- Chapter 8. Vulnerability Scanning (20/31)
- Chapter 8. Vulnerability Scanning (21/31)
- Chapter 8. Vulnerability Scanning (22/31)
- Chapter 8. Vulnerability Scanning (23/31)
- Chapter 8. Vulnerability Scanning (24/31)
- Chapter 8. Vulnerability Scanning (25/31)
- Chapter 8. Vulnerability Scanning (26/31)
- Chapter 8. Vulnerability Scanning (27/31)
- Chapter 8. Vulnerability Scanning (28/31)
- Chapter 8. Vulnerability Scanning (29/31)
- Chapter 8. Vulnerability Scanning (30/31)
- Chapter 8. Vulnerability Scanning (31/31)
- Chapter 9. Wireless (1/19)
- Chapter 9. Wireless (2/19)
- Chapter 9. Wireless (3/19)
- Chapter 9. Wireless (4/19)
- Chapter 9. Wireless (5/19)
- Chapter 9. Wireless (6/19)
- Chapter 9. Wireless (7/19)
- Chapter 9. Wireless (8/19)
- Chapter 9. Wireless (9/19)
- Chapter 9. Wireless (10/19)
- Chapter 9. Wireless (11/19)
- Chapter 9. Wireless (12/19)
- Chapter 9. Wireless (13/19)
- Chapter 9. Wireless (14/19)
- Chapter 9. Wireless (15/19)
- Chapter 9. Wireless (16/19)
- Chapter 9. Wireless (17/19)
- Chapter 9. Wireless (18/19)
- Chapter 9. Wireless (19/19)
- Chapter 10. Redirection (1/8)
- Chapter 10. Redirection (2/8)
- Chapter 10. Redirection (3/8)
- Chapter 10. Redirection (4/8)
- Chapter 10. Redirection (5/8)
- Chapter 10. Redirection (6/8)
- Chapter 10. Redirection (7/8)
- Chapter 10. Redirection (8/8)
- Chapter 11. Denial-of-Service (DoS) (1/6)
- Chapter 11. Denial-of-Service (DoS) (2/6)
- Chapter 11. Denial-of-Service (DoS) (3/6)
- Chapter 11. Denial-of-Service (DoS) (4/6)
- Chapter 11. Denial-of-Service (DoS) (5/6)
- Chapter 11. Denial-of-Service (DoS) (6/6)
- Appendix A. References
- Appendix B. Tool Syntax (1/10)
- Appendix B. Tool Syntax (2/10)
- Appendix B. Tool Syntax (3/10)
- Appendix B. Tool Syntax (4/10)
- Appendix B. Tool Syntax (5/10)
- Appendix B. Tool Syntax (6/10)
- Appendix B. Tool Syntax (7/10)
- Appendix B. Tool Syntax (8/10)
- Appendix B. Tool Syntax (9/10)
- Appendix B. Tool Syntax (10/10)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Practical Hacking Techniques and Countermeasures
- Author(s):
- Release date: November 2006
- Publisher(s): Auerbach Publications
- ISBN: 9781420013382
You might also like
book
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with …
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
book
Web Hacking: Attacks and Defense
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking …
book
Operating System Forensics
Operating System Forensics is the first book to cover all three critical operating systems for digital …