Counter Hack Reloaded A Step-by-Step Guide to Computer Attacks and Effective Defenses

ISBN-10: 0131481045
ISBN-13: 9780131481046
Edition: 2nd 2006 (Revised)
List price: $84.99 Buy it from $59.74
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Presenting the hacker's view of network technology and its vulnerabilities, this book describes the five phases of hacking, and how to fight them. There is a special section on techniques used to fool intrusion detection.

New Starting from $59.74
eBooks Starting from $63.99
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $84.99
Edition: 2nd
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 12/23/2005
Binding: Paperback
Pages: 784
Size: 6.75" wide x 9.00" long x 1.25" tall
Weight: 2.970
Language: English

Presenting the hacker's view of network technology and its vulnerabilities, this book describes the five phases of hacking, and how to fight them. There is a special section on techniques used to fool intrusion detection.

Foreword
Preface Reloaded
About the Authors
Introduction
The Computer World and the Golden Age of Hacking
Why This Book?
The Threat: Never Underestimate Your Adversary
A Note on Terminology and Iconography
Caveat: These Tools Could Hurt You
Organization of Rest of the Book
Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book
The OSI Reference Model and Protocol Layering
How Does TCP/IP Fit In?
Understanding TCP/IP
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Internet Protocol (IP) and Internet Control Message Protocol (ICMP)
ICMP
Other Network-Level Issues
Donrsquo;t Forget About the Data Link and Physical Layers!
Security Solutions for the Internet
Conclusion
Linux and Unix Overview: Pretty Much Everything You Need to Know About Linux and Unix to Follow the Rest of This Book
Introduction
Architecture
Accounts and Groups
Linux and Unix Permissions
Linux and Unix Trust Relationships
Common Linux and Unix Network Services
Conclusion
Windows NT/000/XP/00 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book
Introduction
A Brief History of Time
The Underlying Windows Operating System Architecture
How Windows Password Representations Are Derived
Kernel Mode
From Service Packs and Hotfixes to Windows Update and Beyond
Accounts and Groups
Privilege Control
Policies
Trust
Auditing
Object Access Control and Permissions
Network Security
Windows 2000 and Beyond: Welcome to the New Millennium
Conclusion
Phase 1: Reconnaissance
Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving
Search the Fine Web (STFW)

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×