Limit search to available items
Book Cover
Book
Author Chirillo, John, 1970-

Title Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo
Published New York : Wiley, 2001

Copies

Location Call no. Vol. Availability
 MELB  005.8 Chi/Har  AVAILABLE
Description xvi, 944 pages : illustrations ; 23 cm + i computer optical disc (4 3/4 in.)
Contents Machine derived contents note: Acknowledgments. A Note to the Reader. Introduction. IN THE BEGINNING. Understanding Communication Protocols. NetWare and NetBIOS Technology. PUTTING IT ALL TOGETHER. Understanding Communication Mediums. UNCOVERING VULNERABILITIES. Intuitive Intermission: A Little Terminology. Well-Known Ports and Their Services. Discovery and Scanning Techniques. HACKING SECURITY HOLES. Intuitive Intermission: A Hacker's Genesis. The Hacker's Technology Handbook. Hacker Coding Fundamentals. Port, Socket, and Service Vulnerability Penetrations. VULNERABILITY HACKING SECRETS. Intuitive Intermission: A Hacker's Vacation. Gateways and Routers and Internet Server Daemons. Operating Systems. Proxies and Firewalls. THE HACKER'S TOOLSBOX. Intuitive Intermission: The Evolution of a Hacker. TigerSuite: The Complete Internetworking Security Toolbox. Appendix A: IP Reference Table and Subnetting Charts. Appendix B: Well-Known Ports and Services. Appendix C: All-Inclusive Ports and Services. Appendix D: Detrimental Ports and Services. Appendix E: What's on the CD. Appendix F: Most Common Viruses. Appendix G: Vendor Codes. Glossary. References. Index
Notes "Wiley Computer Publishing."
Bibliography Includes bibliographical references and index
Notes Also available as an electronic book via the World Wide Web to institutions affiliated with netLibrary, Inc
Subject Computer networks -- Security measures.
Computer security.
LC no. 2001017664
ISBN 0471189928 (electronic bk.)
047141624X (paperback: alk. paper)