Download App
>> | LShop | >> | Book | >> | Reference, Informati... | >> | Encyclopaedias & Ref... | >> | Hack Proofing Your N... |
ISBN
:
9788177222388
Publisher
:
Dreamtech Press
Subject
:
Encyclopaedias & Reference Works, Computer Security
Binding
:
paperback
Year
:
2002
₹
799.0
₹
591.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
This book is intended to teach skills and techniques that will be useful for breaking into computers. Every other chapter has been brought up to date, retooled for an attack focus, tightened up and generally improved. Special Feature Know the Laws of Security: Review the authors' guidelines for discovering security problems when reviewing or designing a system. Learn the Seven Categories of Attack: See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! Prevent Diffing: See how the comparison of a program, library, or file before and after some action can affect your network data. Learn about Standard Cryptographic Algorithms: See how secure your encrypted files and passwords really are. Understand Format String Vulnerabilities: Learn about one of the newest additions to the hacker's bag of tricks. Read About Session Hijacking Types: Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. Understand the Strategic Constraints of Tunnel Design Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. Hack Proof Your Hardware: Design products with tamper mechanisms: resistance, evidence, detection, and response. Download a Free Sniffer from the Book's Website: Access the Hack Proofing Website for complete source code and Carnivore Source Code.
Author Biography
Dan “Effugas” Kaminsky (CISSP) worked for two years at Cisco Systems designing security infrastructure for large-scale network monitoring systems. Rain Forest Puppy is a security research and development consultant for a Midwest-based security consulting company. Ken Pfeil is the security Program manager for Identix Inc’s information technology security division. Joseph “Kingpin” Grand is a Boston based electrical engineer and product designer. His pioneering hardware and security research has been published in various academic and industry journals. Table of Contents Chapter 1: How to Hack Chapter 2: The Laws of Security Chapter 3: Classes of Attack Chapter 4: Methodology Chapter 5: Diffing Chapter 6: Cryptography Chapter 7: Unexpected Input Chapter 8: Buffer Overflow Chapter 9: Format Strings Chapter 10: Sniffing Chapter 11: Session Hijacking Chapter 12: Spoofing: Attacks on rusted Identity Chapter 13: Tunneling Chapter 14: Hardware Hacking Chapter 15: Viruses, Trojan Horses and Worms Chapter 16: IDS Evasion Chapter 17: Automated Security Review and Attack Tools Chapter 18: Reporting Security Problems
Related Items
-
of
Operating Systems : Concepts & Design,Milenkovic,Milenkovic
Milenkovic M
Starts At
828.0
1010.0
18% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary