pt. I. Software Cracking -- 1. Assembly Language -- 2. Windows Reverse Engineering -- 3. Linux Reverse Engineering -- 4. Windows CE Reverse Engineering -- 5. Overflow Attacks -- pt. II. Network Stalking -- 6. TCP/IP Analysis -- 7. Social Engineering -- 8. Reconnaissance -- 9. OS Fingerprinting -- 10. Hiding the Tracks -- pt. III. Platform Attacks -- 11. Unix Defense -- 12. Unix Attacks -- 13. Windows Client Attacks -- 14. Windows Server Attacks -- 15. SOAP XML Web Services Security -- 16. SQL Injection -- 17. Wireless Security -- pt. IV. Advanced Defense -- 18. Audit Trail Analysis -- 19. Intrusion Detection Systems -- 20. Honeypots -- 21. Incident Response -- 22. Forensics and Antiforensics -- pt. V. Appendix -- App. Useful SoftICE Commands and Breakpoints
Bibliography
Includes bibliographical references and index
Issuing Body
Digitized and made available by: CRC Press
Notes
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL