
The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks
by Young, Susan; Aitel, Dave-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Buy New
Rent Textbook
Rent Digital
Used Textbook
We're Sorry
Sold Out
Summary
Table of Contents
Preface | |
Case Study in Subversion | |
Know Your Opponent | |
Anatomy of an Attack | |
Your Defensive Arsenal | |
Programming | |
The Protocols | |
Domain Name Service | |
Directory Services | |
Simple Mail Transfer Protocol | |
Hypertext Transfer Protocol | |
Database Hacking | |
Malware | |
Network Hardware | |
Consolidating Gains | |
After the Fall | |
Conclusion | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.