0

My Bag

0.00

Download App

Hack Proofing Your Network 26.0%OFF

Hack Proofing Your Network

by Ryan Russell

  • ISBN

    :  

    9788177222388

  • Publisher

    :  

    Dreamtech Press

  • Subject

    :  

    Encyclopaedias & Reference Works, Computer Security

  • Binding

    :  

    paperback

  • Year

    :  

    2002

799.0

26.0% OFF

591.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    This book is intended to teach skills and techniques that will be useful for breaking into computers. Every other chapter has been brought up to date, retooled for an attack focus, tightened up and generally improved. Special Feature Know the Laws of Security: Review the authors' guidelines for discovering security problems when reviewing or designing a system. Learn the Seven Categories of Attack: See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! Prevent Diffing: See how the comparison of a program, library, or file before and after some action can affect your network data. Learn about Standard Cryptographic Algorithms: See how secure your encrypted files and passwords really are. Understand Format String Vulnerabilities: Learn about one of the newest additions to the hacker's bag of tricks. Read About Session Hijacking Types: Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. Understand the Strategic Constraints of Tunnel Design Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. Hack Proof Your Hardware: Design products with tamper mechanisms: resistance, evidence, detection, and response. Download a Free Sniffer from the Book's Website: Access the Hack Proofing Website for complete source code and Carnivore Source Code.

  • Author Biography

    Dan “Effugas” Kaminsky (CISSP) worked for two years at Cisco Systems designing security infrastructure for large-scale network monitoring systems. Rain Forest Puppy is a security research and development consultant for a Midwest-based security consulting company. Ken Pfeil is the security Program manager for Identix Inc’s information technology security division. Joseph “Kingpin” Grand is a Boston based electrical engineer and product designer. His pioneering hardware and security research has been published in various academic and industry journals. Table of Contents Chapter 1: How to Hack Chapter 2: The Laws of Security Chapter 3: Classes of Attack Chapter 4: Methodology Chapter 5: Diffing Chapter 6: Cryptography Chapter 7: Unexpected Input Chapter 8: Buffer Overflow Chapter 9: Format Strings Chapter 10: Sniffing Chapter 11: Session Hijacking Chapter 12: Spoofing: Attacks on rusted Identity Chapter 13: Tunneling Chapter 14: Hardware Hacking Chapter 15: Viruses, Trojan Horses and Worms Chapter 16: IDS Evasion Chapter 17: Automated Security Review and Attack Tools Chapter 18: Reporting Security Problems

Related Items

-

of

  • OFFER

    Operating Systems : Concepts & Design,Milenkovic,Milenkovic

    Milenkovic M

    Starts At

    828.0

    1010.0

    18% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Competing For The Future books

    Hamel

    Starts At

    495.0

    635.0

    22% OFF

  • OFFER

    Britannica Concise Encyclopedia

    Jacob E. Safra

    Starts At

    2186.0

    2995.0

    27% OFF

  • OFFER

    INDIAN HISTORY (ANCIENT AND MEDIEVAL)

    Britannica

    Starts At

    226.0

    290.0

    22% OFF

  • OFFER

    OPTICAL ELECTRONICS

    Ghatak

    Starts At

    415.0

    495.0

    16% OFF

  • The Financial Expert

    R. K Narayan

    Starts At

    230.0

  • OFFER

    Longman Business English Dictionary

    Longman

    Starts At

    193.0

    245.0

    21% OFF

  • A History Of India- Vol Two

    Percival Spear

    Starts At

    350.0

  • Orientalism: Western Conceptions Of The Orient

    Edward W. Said

    Starts At

    499.0

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary