Skip to content

Counter Hack A Step-by-Step Guide to Computer Attacks and Effective Defenses

Best in textbook rentals since 2012!

ISBN-10: 0130332739

ISBN-13: 9780130332738

Edition: 2002

Authors: Edward Skoudis

List price: $54.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools, and proven, step-by-step countermeasures. Skoudis begins by presenting the hacker's view of networks and their vulnerabilities, with especially detailed coverage of how hackers view the TCP/IP protocol suite. He introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for network vulnerabilities; gaining access and exploiting the system; maintaining access; and…    
Customers also bought

Book details

List price: $54.99
Copyright year: 2002
Publisher: Prentice Hall PTR
Publication date: 7/23/2001
Binding: Paperback
Pages: 592
Size: 7.00" wide x 9.25" long x 1.50" tall
Weight: 1.848
Language: English

Foreword
Preface
Introduction
Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less
UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less
Windows NT/2000 Overview: Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access Using Application and Operating System Attacks
Phase 3: Gaining Access Using Network Attacks
Phase 3: Denial-of-Service Attacks
Phase 4: Maintaining Access: Trojans, Backdoors, and RootKits ... Oh My!
Phase 5: Covering Tracks and Hiding
Putting It All Together: Anatomy of an Attack
The Future, Resources, and Conclusions
Glossary
Index