This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.
Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Publisher: Taylor & Francis Ltd
Number of pages: 896
Weight: 1370 g
Dimensions: 235 x 156 x 44 mm
- E-Streams, Vol. 7, No. 9, Sept. 2004
-Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics
You may also be interested in...
Would you like to proceed to the App store to download the Waterstones App?
Or, add to basket, pay online, collect in as little as 2 hours, subject to availability.