| Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition | |
| by Stuart McClure, Joel Scambray and George Kurtz | |
| McGraw-Hill/Osborne 2005 (692 pages) | |
| ISBN:9780072260816 | |
| Using real-world case studies and detailed examples of the latest devious break-ins, this book shows IT professionals how to protect computers and networks against the most recent security vulnerabilities. |
| Table of Contents | |||
| | Hacking Exposed ”Network Security Secrets & Solutions, Fifth Edition | ||
| | Foreword | ||
| | Introduction | ||
| Part I - Casing the Establishment | |||
| | Chapter 1 | - | Footprinting |
| | Chapter 2 | - | Scanning |
| | Chapter 3 | - | Enumeration |
| Part II - System Hacking | |||
| | Chapter 4 | - | Hacking Windows |
| | Chapter 5 | - | Hacking UNIX |
| | Chapter 6 | - | Remote Connectivity and VoIP Hacking |
| Part III - Network Hacking | |||
| | Chapter 7 | - | Network Devices |
| | Chapter 8 | - | Wireless Hacking |
| | Chapter 9 | - | Firewalls |
| | Chapter 10 | - | Denial of Service Attacks |
| Part IV - Software Hacking | |||
| | Chapter 11 | - | Hacking Code |
| | Chapter 12 | - | Web Hacking |
| | Chapter 13 | - | Hacking the Internet User |
| Part V - Appendixes | |||
| | Appendix A | - | Ports |
| | Appendix B | - | Top 14 Security Vulnerabilities |
| | Index | ||
| | List of Figures | ||
| | List of Tables | ||
| | List of Code Listings | ||
| | List of Sidebars | ||