Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition | |
by Stuart McClure, Joel Scambray and George Kurtz | |
McGraw-Hill/Osborne 2005 (692 pages) | |
ISBN:9780072260816 | |
Using real-world case studies and detailed examples of the latest devious break-ins, this book shows IT professionals how to protect computers and networks against the most recent security vulnerabilities. |
Table of Contents | |||
![]() | Hacking Exposed ”Network Security Secrets & Solutions, Fifth Edition | ||
![]() | Foreword | ||
![]() | Introduction | ||
Part I - Casing the Establishment | |||
![]() | Chapter 1 | - | Footprinting |
![]() | Chapter 2 | - | Scanning |
![]() | Chapter 3 | - | Enumeration |
Part II - System Hacking | |||
![]() | Chapter 4 | - | Hacking Windows |
![]() | Chapter 5 | - | Hacking UNIX |
![]() | Chapter 6 | - | Remote Connectivity and VoIP Hacking |
Part III - Network Hacking | |||
![]() | Chapter 7 | - | Network Devices |
![]() | Chapter 8 | - | Wireless Hacking |
![]() | Chapter 9 | - | Firewalls |
![]() | Chapter 10 | - | Denial of Service Attacks |
Part IV - Software Hacking | |||
![]() | Chapter 11 | - | Hacking Code |
![]() | Chapter 12 | - | Web Hacking |
![]() | Chapter 13 | - | Hacking the Internet User |
Part V - Appendixes | |||
![]() | Appendix A | - | Ports |
![]() | Appendix B | - | Top 14 Security Vulnerabilities |
![]() | Index | ||
![]() | List of Figures | ||
![]() | List of Tables | ||
![]() | List of Code Listings | ||
![]() | List of Sidebars |