Description |
xvi, 944 pages : illustrations ; 23 cm + i computer optical disc (4 3/4 in.) |
Contents |
Machine derived contents note: Acknowledgments. A Note to the Reader. Introduction. IN THE BEGINNING. Understanding Communication Protocols. NetWare and NetBIOS Technology. PUTTING IT ALL TOGETHER. Understanding Communication Mediums. UNCOVERING VULNERABILITIES. Intuitive Intermission: A Little Terminology. Well-Known Ports and Their Services. Discovery and Scanning Techniques. HACKING SECURITY HOLES. Intuitive Intermission: A Hacker's Genesis. The Hacker's Technology Handbook. Hacker Coding Fundamentals. Port, Socket, and Service Vulnerability Penetrations. VULNERABILITY HACKING SECRETS. Intuitive Intermission: A Hacker's Vacation. Gateways and Routers and Internet Server Daemons. Operating Systems. Proxies and Firewalls. THE HACKER'S TOOLSBOX. Intuitive Intermission: The Evolution of a Hacker. TigerSuite: The Complete Internetworking Security Toolbox. Appendix A: IP Reference Table and Subnetting Charts. Appendix B: Well-Known Ports and Services. Appendix C: All-Inclusive Ports and Services. Appendix D: Detrimental Ports and Services. Appendix E: What's on the CD. Appendix F: Most Common Viruses. Appendix G: Vendor Codes. Glossary. References. Index |
Notes |
"Wiley Computer Publishing." |
Bibliography |
Includes bibliographical references and index |
Notes |
Also available as an electronic book via the World Wide Web to institutions affiliated with netLibrary, Inc |
Subject |
Computer networks -- Security measures.
|
|
Computer security.
|
LC no. |
2001017664 |
ISBN |
0471189928 (electronic bk.) |
|
047141624X (paperback: alk. paper) |
|