Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) (Paperback)
List Price: $59.99
Price: $35.99 & this item ships for FREE with Super Saver Shipping.
You Save: $24.00 (40%)
Product Promotions
Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.
Product Details
Paperback: 784 pages
Publisher: Prentice Hall PTR; 2 edition (December 23, 2005)
Language: English
ISBN-10: 0131481045
ISBN-13: 978-0131481046
Product Dimensions: 9.2 x 6.9 x 1.4 inches
Shipping Weight: 2.4 pounds
Average Customer Review: 5 stars based on 37 reviews.
Amazon.com Sales Rank: #12,296 in Books
Editorial Reviews
Amazon.com
In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.
The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
No comments:
Post a Comment