The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks

by ;
Pub. Date: 2003-11-24
Publisher(s): Taylor & Francis
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $99.70

Buy New

Arriving Soon. Will ship when available.
$94.95

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:180 Days access
Downloadable:180 Days
$105.60
Online:365 Days access
Downloadable:365 Days
$124.80
Online:1825 Days access
Downloadable:Lifetime Access
$192.00
$105.60

Used Textbook

We're Sorry
Sold Out

Summary

The Hacker#xE2;#xAC;"s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.#xC2;#xA0; Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a #xE2;#xAC;Spath#xE2;#xAC; to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Table of Contents

Preface
Case Study in Subversion
Know Your Opponent
Anatomy of an Attack
Your Defensive Arsenal
Programming
The Protocols
Domain Name Service
Directory Services
Simple Mail Transfer Protocol
Hypertext Transfer Protocol
Database Hacking
Malware
Network Hardware
Consolidating Gains
After the Fall
Conclusion
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.