Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
My acknowledgments are brief. First, I would like to acknowledge the folks at Sams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible mess. They are an awesome editing team and their expertise is truly extraordinary | Maximum Security A Hacker s Guide to Protecting Y our Internet Site and Network Maximum Security A Hacker s Guide to Protecting Your Internet Site and Network Table of Contents Introduction I Setting the Stage Chapter 1 - Why Did I Write This Book Chapter 2 - How This Book Will Help You Chapter 3 - Hackers and Crackers Chapter 4 - Just Who Can Be Hacked Anyway II Understanding the Terrain Chapter 5 - Is Security a Futile Endeavor Chapter 6 - A Brief Primer on TCP IP Chapter 7 - Birth of a Network The Internet Chapter 8 - Internet Warfare III Tools Chapter 9 - Scanners Chapter 10 - Password Crackers Chapter 11 - Trojans Chapter 12 - Sniffers Chapter 13 - Techniques to Hide One s Identity Chapter 14 - Destructive Devices IV Platforms and Security Chapter 15 - The Hole Chapter 16 - Microsoft Chapter 17 - UNIX The Big Kahuna Chapter 18 - Novell Chapter 19 - VAX VMS Chapter 20 - Macintosh Chapter 21 - Plan 9 from Bell Labs V Beginning at Ground Zero Chapter 22 - Who or What Is Root Chapter 23 - An Introduction to Breaching a Server Internally Chapter 24 - Security Concepts VI The Remote Attack Chapter 25 - The Remote Attack Chapter 26 - Levels of Attack Chapter 27 - Firewalls Chapter 28 - Spoofing Attacks Chapter 29 - Telnet-Based Attacks Chapter 30 - Language Extensions and Security VII The Law Chapter 31 - Reality Bytes Computer Security and the Law VIII Appendixes Appendix A - How to Get More Information Appendix B - Security Consultants Appendix C - A Hidden Message About the Internet Appendix D - What s on the CD-ROM Copyright Angel722 Computer Publishing. All rights .