|Aangeboden in rubriek:
Hebt u iets om te verkopen?

Counter Hack Reloaded : A Step-By-Step Guide to Computer Attacks and...

Objectstaat:
Vrijwel nieuw
Prijs:
US $22,50
OngeveerEUR 20,75
Was US $25,00 Wat betekent deze prijs?
Recente verkoopprijs (door de verkoper verstrekt)
Bespaar US $2,50 (10% korting)
Verzendkosten:
US $4,87 (ongeveer EUR 4,49) Voordelige verzendservice. Details bekijkenvoor verzending
Bevindt zich in: Middletown, Ohio, Verenigde Staten
Levering:
Geschatte levering tussen di, 4 jun en do, 6 jun tot 43230
De levertijd wordt geschat met onze eigen methode op basis van onder meer de nabijheid van de koper ten opzichte van de objectlocatie, de geselecteerde verzendservice, en de verzendgeschiedenis van de verkoper. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
Betalingen:
     

Winkel met vertrouwen

Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. 

Verkopergegevens

Geregistreerd als particuliere verkoper, dus de consumentenrechten die voortvloeien uit de EU-wetgeving inzake consumentenbescherming zijn niet van toepassing. De geld-terug-garantie van eBay geldt nog steeds voor de meeste aankopen.
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:135059023503

Specificaties

Objectstaat
Vrijwel nieuw: Een boek dat er als nieuw uitziet, maar al wel is gelezen. De kaft is niet zichtbaar ...
ISBN
9780131481046
Publication Name
Counter Hack Reloaded : a Step-By-Step Guide to Computer Attacks and Effective Defenses
Item Length
9.2in
Publisher
Pearson Education
Publication Year
2005
Type
Textbook
Format
Perfect
Language
English
Item Height
1.9in
Author
Tom Liston, Edward Skoudis
Features
Revised
Item Width
7in
Item Weight
46.2 Oz
Number of Pages
784 Pages

Over dit product

Product Information

This guide empowers network and system administrators to defend their information and computing assets--whether or not they have security experience. Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics, and specific, proven countermeasures for both UNIX and Windows environments.

Product Identifiers

Publisher
Pearson Education
ISBN-10
0131481045
ISBN-13
9780131481046
eBay Product ID (ePID)
47529010

Product Key Features

Author
Tom Liston, Edward Skoudis
Publication Name
Counter Hack Reloaded : a Step-By-Step Guide to Computer Attacks and Effective Defenses
Format
Perfect
Language
English
Features
Revised
Publication Year
2005
Type
Textbook
Number of Pages
784 Pages

Dimensions

Item Length
9.2in
Item Height
1.9in
Item Width
7in
Item Weight
46.2 Oz

Additional Product Features

Lc Classification Number
Tk5105.59
Edition Description
Revised Edition
Edition Number
2
Table of Content
(NOTE: Each chapter concludes with Summary ). Foreword. Preface Reloaded. About the Authors. 1. Introduction. The Computer World and the Golden Age of Hacking. Why This Book? The Threat: Never Underestimate Your Adversary. A Note on Terminology and Iconography. Caveat: These Tools Could Hurt You. Organization of Rest of the Book. 2. Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book. The OSI Reference Model and Protocol Layering. How Does TCP/IP Fit In? Understanding TCP/IP. Transmission Control Protocol (TCP). User Datagram Protocol (UDP). Internet Protocol (IP) and Internet Control Message Protocol (ICMP). ICMP. Other Network-Level Issues. Don''t Forget About the Data Link and Physical Layers! Security Solutions for the Internet. Conclusion. 3. Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book. Introduction. Architecture. Accounts and Groups. Linux and UNIX Permissions. Linux and UNIX Trust Relationships. Common Linux and UNIX Network Services. Conclusion. 4. Windows NT/000/XP/00 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book. Introduction. A Brief History of Time. The Underlying Windows Operating System Architecture. How Windows Password Representations Are Derived. Kernel Mode. From Service Packs and Hotfixes to Windows Update and Beyond. Accounts and Groups. Privilege Control. Policies Trust. Auditing. Object Access Control and Permissions. Network Security. Windows 2000 and Beyond: Welcome to the New Millennium. Conclusion. 5. Phase 1: Reconnaissance. Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving. Search the Fine Web (STFW). Who is Databases: Treasure Chests of Information. The Domain Name System. General-Purpose Reconnaissance Tools. Conclusion. 6. Phase 2: Scanning. War Driving: Finding Wireless Access Points. War Dialing: Looking for Modems in All the Right Places. Network Mapping. Determining Open Ports Using Port Scanners. Vulnerability-Scanning Tools. Intrusion Detection System and Intrusion Prevention System Evasion. Conclusion. 7. Phase 3: Gaining Access Using Application and Operating System Attacks. Script Kiddie Exploit Trolling. Pragmatism for More Sophisticated Attackers. Buffer Overflow Exploits. Password Attacks. Web Application Attacks. Exploiting Browser Flaws. Conclusion. 8. Phase 4: Gaining Access Using Network Attacks. Sniffing. IP Address Spoofing. Session Hijacking. Netcat: A General-Purpose Network Tool. Conclusion. 9. Phase 3: Denial-of-Service Attacks. Locally Stopping Services. Locally Exhausting Resources. Remotely Stopping Services. Remotely Exhausting Resources. Conclusion. 10. Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits ... Oh My! Trojan Horses. Backdoors. The Devious Duo: Backdoors Melded into Trojan Horses. Nasty: Application-Level Trojan Horse Backdoor Tools. Also Nasty: The Rise of the Bots. Additional Nastiness: Spyware Everywhere! Defenses Against Application-Level Trojan Horse Backdoors, Bots, and Spyware. Even Nastier: User-Mode Rootkits. Defending Against User-Mode Rootkits. Nastiest: Kernel-Mode Rootkits. Defending Against Kernel-Mode Rootkits. Conclusion. 11. Phase 5: Covering Tracks and Hiding. Hiding Evidence by Altering Event Logs. Defenses Against Log and Accounting File Attacks. Creating Difficult-to-Find Files and Directories. Hiding Evidence on the Network: Covert Channels. Defenses Against Covert Channels. Conclusion. 12. Putting It All Together: Anatomy of an Attack. Scenario 1: Crouching Wi-Fi, Hidden Dragon. Scenario 2: Death of a Telecommuter. Scenario 3: The Manchurian Contractor. Conclusion. 13. The Future, References, and Conclusions. Where Are We Heading? Keeping Up to Speed. Final Thoughts ... Live Long and Prosper. Index.
Copyright Date
2006
Topic
Security / General, Security / Networking
Lccn
2005-027164
Dewey Decimal
005.8
Intended Audience
Scholarly & Professional
Dewey Edition
22
Illustrated
Yes
Genre
Computers

Objectbeschrijving van de verkoper

Kickoff Collectibles

Kickoff Collectibles

100% positieve feedback
544 objecten verkocht
Reageert meestal binnen 24 uur

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden

Nauwkeurige beschrijving
5.0
Redelijke verzendkosten
4.8
Verzendtijd
5.0
Communicatie
5.0
Geregistreerd als particuliere verkoper
Dus de consumentenrechten die voortvloeien uit EU-wetgeving voor consumentenbescherming zijn niet van toepassing. eBay-kopersbescherming geldt nog steeds voor de meeste aankopen.

Feedback verkoper (167)

1***9 (187)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Great card, well packaged!
s***d (1286)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Great seller, easy deal, great shipping cost.
d***a (115)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Great card thanks