Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
来源:互联网 发布:伊芙蕾雅淘宝 编辑:程序博客网 时间:2024/04/29 08:27
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks. For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.
Important features of this new edition include*All-new "anatomy-of-an-attack" scenarios and tools
*An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more
*Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking"
*New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit
*New information on dangerous, hard-to-detect, kernel-mode rootkits
http://rapidshare.com/files/155703277/0131481045.rar
http://depositfiles.com/files/767v71ki7
- Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
- How to Read and Understand a Scientific Paper: A Step-by-Step Guide for Non-Scientists
- Beginner’s Guide to ALE and IDocs – a step-by-step approach
- CGAL Arrangements and Their Applications: A Step-By-Step Guide
- A step-by-step guide to the use of the Intel OpenCV library and the Microsoft DirectShow technology
- Mac OS X - A step-by-step guide to installing Go and building your first web service
- Step Detector and Step Counter
- Step by step guide to set up master and slave machines
- Step By Step Guide To Create Physical Standby Database Using RMAN Backup and Restore
- A Simple Step-By-Step Guide To Apache Tomcat SSL Configuration
- A Simple Step-By-Step Guide To Apache Tomcat SSL Configuration
- Step by Step Guide to Add a SQL Job in SQL Server 2005
- How to Install the ELK Stack on AWS: A Step-By-Step Guide
- Step-by-Step Guide to Internet Protocol Security (IPSec)
- Creating Games in C++ : A Step-by-Step Guide
- Deploying Rails Applications: A Step-by-Step Guide
- Tomcat Clustering - A Step By Step Guide --转载
- OpenCV on Mac OSX: A step-by-step guide
- Windows Live Writer的第一篇测试文章
- Google Maps API 编码折线算法实现
- 搜索引擎与社会责任
- CorelDRAW: The Official Guide
- MSDN library for Visual Studio 2008 SP1已经提供下载
- Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
- 不是项目经理
- Ubuntu: The Complete Reference
- 项目中的执行力
- 明日3/18 股票操作分析
- Code Quality: The Open Source Perspective
- thickbox 和jquery form 一起使用出现的问题。
- 使用Servlet监听器统计在线用户
- 最近使用j2me所遇到的问题~