Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition | |
by Stuart McClure, Joel Scambray and George Kurtz | |
McGraw-Hill/Osborne 2005 (692 pages) | |
ISBN:9780072260816 | |
Using real-world case studies and detailed examples of the latest devious break-ins, this book shows IT professionals how to protect computers and networks against the most recent security vulnerabilities. |
Table of Contents | |||
Hacking Exposed ”Network Security Secrets & Solutions, Fifth Edition | |||
Foreword | |||
Introduction | |||
Part I - Casing the Establishment | |||
Chapter 1 | - | Footprinting | |
Chapter 2 | - | Scanning | |
Chapter 3 | - | Enumeration | |
Part II - System Hacking | |||
Chapter 4 | - | Hacking Windows | |
Chapter 5 | - | Hacking UNIX | |
Chapter 6 | - | Remote Connectivity and VoIP Hacking | |
Part III - Network Hacking | |||
Chapter 7 | - | Network Devices | |
Chapter 8 | - | Wireless Hacking | |
Chapter 9 | - | Firewalls | |
Chapter 10 | - | Denial of Service Attacks | |
Part IV - Software Hacking | |||
Chapter 11 | - | Hacking Code | |
Chapter 12 | - | Web Hacking | |
Chapter 13 | - | Hacking the Internet User | |
Part V - Appendixes | |||
Appendix A | - | Ports | |
Appendix B | - | Top 14 Security Vulnerabilities | |
Index | |||
List of Figures | |||
List of Tables | |||
List of Code Listings | |||
List of Sidebars |