Limit search to available items
Book Cover
E-book
Author Peikari, Cyrus.

Title Security warrior / Cyrus Peikari and Anton Chuvakin
Edition 1st ed
Published Beijing ; Sebastopol, CA : O'Reilly & Associates, ©2004

Copies

Description 1 online resource (xvii, 531) : illustrations
Contents pt. I. Software Cracking -- 1. Assembly Language -- 2. Windows Reverse Engineering -- 3. Linux Reverse Engineering -- 4. Windows CE Reverse Engineering -- 5. Overflow Attacks -- pt. II. Network Stalking -- 6. TCP/IP Analysis -- 7. Social Engineering -- 8. Reconnaissance -- 9. OS Fingerprinting -- 10. Hiding the Tracks -- pt. III. Platform Attacks -- 11. Unix Defense -- 12. Unix Attacks -- 13. Windows Client Attacks -- 14. Windows Server Attacks -- 15. SOAP XML Web Services Security -- 16. SQL Injection -- 17. Wireless Security -- pt. IV. Advanced Defense -- 18. Audit Trail Analysis -- 19. Intrusion Detection Systems -- 20. Honeypots -- 21. Incident Response -- 22. Forensics and Antiforensics -- pt. V. Appendix -- App. Useful SoftICE Commands and Breakpoints
Bibliography Includes bibliographical references and index
Issuing Body Digitized and made available by: CRC Press
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Computer networks -- Security measures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures
Computerbeveiliging.
Preventie.
Opsporing.
Réseaux d'ordinateurs -- Mesures de sûreté.
Form Electronic book
Author Chuvakin, Anton
ISBN 0596005458
9780596005450
9780596517229
059651722X