Counter Hack Reloaded: A Step by Step Guide to Computer Attacks and Effective Defenses (Radia Perlman Series in Computer Networking and Security) Book + PRICE WATCH * Amazon pricing is not included in price watch

Counter Hack Reloaded: A Step by Step Guide to Computer Attacks and Effective Defenses (Radia Perlman Series in Computer Networking and Security) Book

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies". The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.The best part of this book may be two chapters, one each for Windows and Unix, which explain the essential security terms, conventions, procedures and behaviours of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David WallTopics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defences. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes and details a modus operandi that's typical of the bad guys.Read More

from£54.95 | RRP: £37.99
* Excludes Voucher Code Discount Also available Used from £10.89
  • Blackwell

    This guide empowers network and system administrators to defend their information and computing assets--whether or not they have security experience. Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools...

  • ASDA

    Intended for network/system administrators and security professionals this work covers everything from the basic principles to the details of online attack methods and counter. It walks you through each attack and demystifys every tool and tactic.

  • Pickabook

    Tom Liston, Edward Skoudis

  • 0131481045
  • 9780131481046
  • Edward Skoudis, Tom Liston
  • 23 December 2005
  • Prentice Hall
  • Paperback (Book)
  • 784
  • 2
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.