Skip to content

Counter Hack Reloaded A Step-By-Step Guide to Computer Attacks and Effective Defenses

Best in textbook rentals since 2012!

ISBN-10: 0131481045

ISBN-13: 9780131481046

Edition: 2nd 2006 (Revised)

Authors: Edward Skoudis, Tom Liston

List price: $84.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Presenting the hacker's view of network technology and its vulnerabilities, this book describes the five phases of hacking, and how to fight them. There is a special section on techniques used to fool intrusion detection.
Customers also bought

Book details

List price: $84.99
Edition: 2nd
Copyright year: 2006
Publisher: Pearson Education
Publication date: 12/23/2005
Binding: Paperback
Pages: 784
Size: 7.00" wide x 9.20" long x 1.90" tall
Weight: 2.970
Language: English

Foreword
Preface Reloaded
About the Authors
Introduction
The Computer World and the Golden Age of Hacking
Why This Book?
The Threat: Never Underestimate Your Adversary
A Note on Terminology and Iconography
Caveat: These Tools Could Hurt You
Organization of Rest of the Book
Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book
The OSI Reference Model and Protocol Layering
How Does TCP/IP Fit In?
Understanding TCP/IP
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Internet Protocol (IP) and Internet Control Message Protocol (ICMP)
ICMP
Other Network-Level Issues
Donrsquo;t Forget About the Data Link and Physical Layers!
Security Solutions for the Internet
Conclusion
Linux and Unix Overview: Pretty Much Everything You Need to Know About Linux and Unix to Follow the Rest of This Book
Introduction
Architecture
Accounts and Groups
Linux and Unix Permissions
Linux and Unix Trust Relationships
Common Linux and Unix Network Services
Conclusion
Windows NT/000/XP/00 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book
Introduction
A Brief History of Time
The Underlying Windows Operating System Architecture
How Windows Password Representations Are Derived
Kernel Mode
From Service Packs and Hotfixes to Windows Update and Beyond
Accounts and Groups
Privilege Control
Policies
Trust
Auditing
Object Access Control and Permissions
Network Security
Windows 2000 and Beyond: Welcome to the New Millennium
Conclusion
Phase 1: Reconnaissance
Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving
Search the Fine Web (STFW)