Hack Attacks Revealed: A Complete Reference for UNIX, Windows and Linux with Custom Security Toolkit Book + PRICE WATCH * Amazon pricing is not included in price watch

Hack Attacks Revealed: A Complete Reference for UNIX, Windows and Linux with Custom Security Toolkit Book

The much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license)Read More

from£N/A | RRP: £31.99
* Excludes Voucher Code Discount Also available Used from £N/A
  • 0471232823
  • 9780471232827
  • John Chirillo
  • 28 August 2002
  • John Wiley & Sons
  • Paperback (Book)
  • 960
  • 2nd Edition
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.