Cart
Free Shipping in the UK
Proud to be B-Corp

Hack Attacks Revealed John Chirillo

Hack Attacks Revealed By John Chirillo

Hack Attacks Revealed by John Chirillo


£5.30
New RRP £44.50
Condition - Very Good
Only 1 left

Summary

Network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. This book describes in detail the tools and techniques used by network hackers and how they work to exploit security loopholes.

Hack Attacks Revealed Summary

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit by John Chirillo

The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.

Hack Attacks Revealed Reviews

"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!" (Kelly M. Larsen, C2Protect, DoD Security Instructor) "Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems." (L. Peterson, AFCERT) "[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review) "Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

About John Chirillo

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Table of Contents

Acknowledgments; A Note to the Reader; Introduction; IN THE BEGINNING; Understanding Communication Protocols; NetWare and NetBIOS Technology; PUTTING IT ALL TOGETHER; Understanding Communication Mediums; UNCOVERING VULNERABILITIES; Intuitive Intermission: A Little Terminology; Well-Known Ports and Their Services; Discovery and Scanning Techniques; HACKING SECURITY HOLES; Intuitive Intermission: A Hacker's Genesis; The Hacker's Technology Handbook; Hacker Coding Fundamentals; Port, Socket, and Service Vulnerability Penetrations; VULNERABILITY HACKING SECRETS; Intuitive Intermission: A Hacker's Vacation; Gateways and Routers and Internet Server Daemons; Operating Systems; Proxies and Firewalls; THE HACKER'S TOOLSBOX; Intuitive Intermission: The Evolution of a Hacker; TigerSuite: The Complete Internetworking Security Toolbox; Appendix A: IP Reference Table and Subnetting Charts; Appendix B: Well-Known Ports and Services; Appendix C: All-Inclusive Ports and Services; Appendix D: Detrimental Ports and Services; Appendix E: What's on the CD; Appendix F: Most Common Viruses; Appendix G: Vendor Codes; Glossary; References; Index.

Additional information

GOR001533315
9780471416241
047141624X
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit by John Chirillo
Used - Very Good
Hardback
John Wiley and Sons Ltd
2001-04-20
960
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Hack Attacks Revealed