The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks

, by ;
The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks by Young, Susan; Aitel, Dave, 9780203490044
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780203490044 | 0203490045
  • Cover:
  • Copyright: 11/24/2003

  • Rent

    (Recommended)

    $65.04
     
    Term
    Due
    Price
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.
  • Buy New

    Usually Ships in 3-5 Business Days

    $93.54
  • eBook

    eTextBook from VitalSource Icon

    Available Instantly

    Online: 180 Days

    Downloadable: 180 Days

    $92.81

The Hacker#xE2;#xAC;"s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.#xC2;#xA0; Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a #xE2;#xAC;Spath#xE2;#xAC; to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button