Hacking Exposed: Network Security Secrets and Solutions, Network Intrusion Detection: An Analysts' Handbook, Hack Proofing Your Network: Internet Tradecraft, Maximum Linux Security : A Hacker's Guide to Protecting Your Linux Server and Workstation, Mastering Network Security, Hacking Exposed: Network Security Secrets and Solutions, Network Intrusion Detection: An Analysts' Handbook, Hack Proofing Your Network: Internet Tradecraft, Maximum Linux Security : A Hacker's Guide to Protecting Your Linux Server and Workstation, Mastering Network Security
Computer Services Online Bookstore
Authorized Resellers for..
 
     

  
Hacking Exposed: Network Security Secrets and Solutions
by Stuart McClure, Joel Scambray, George Kurtz

Hacking Exposed: Network Security Secrets and Solutions


Paperback
- 484 pages (September 10, 1999)


Customers who bought this book also bought:

Editorial Reviews

Amazon.com
Whenever Hollywood does a movie in which someone breaks into a computer, the hacking scenes are completely laughable to anyone who knows the first thing about computer security. Think of Hacking Exposed: Network Security Secrets and Solutions as a computer thriller for people with a clue. This is a technical book, certainly--URLs, procedures, and bits of advice take the place of plot and characters--but the information about hackers' tools will leave you wondering exactly how vulnerable your system is. More to the point, the explicit instructions for stealing supposedly secure information (a Windows NT machine's Security Access Manager file, for example) will leave you absolutely certain that your computers have gaping holes in their armor.

The book describes the security characteristics of several computer-industry pillars, including Windows NT, Unix, Novell NetWare, and certain firewalls. It also explains what sorts of attacks against these systems are feasible, which are popular, and what tools exist to make them easier. The authors walk the reader through numerous attacks, explaining exactly what attackers want, how they defeat the relevant security features, and what they do once they've achieved their goal. In what might be called after-action reports, countermeasures that can help steer bad buys toward less-well-defended prey are explained. If you run Linux, you may want to supplement the Unix information in this book with Maximum Linux Security, another practical-minded and very popular security text. --David Wall

Topics covered: The state of the art in breaking into computers and networks, as viewed from the vantage point of the attacker and the defender. There's information on surveying a system remotely, identifying weak points, and exploiting weaknesses in specific operating systems (Windows NT, Unix, and Novell NetWare, mostly). Coverage also includes war dialers, circumventing firewalls, denial-of-service attacks, and remote-control software. There's a cool appendix on the security characteristics of Windows 2000.

AlephOne, Bugtraq Moderator
"If this book doesn't scare and motivate you to take security seriously, nothing will."

| Click here for more information or to order online |



Look for similar books by subject:

Browse for books in:
  • Subjects > Computers & Internet > Networking & OS > Networks, Protocols & API's > Network Security
  • Subjects > Computers & Internet > Networking & OS > Networks, Protocols & API's > Networks
  • Subjects > Computers & Internet > Programming > Project Management > Security
  • Subjects > Computers & Internet > Networking & OS > Networks, Protocols & API's > General


  • | Compserv Computer Book Index | Computer Services Main Index | Compserv Software | Computer magazines |