The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks (Hardback)
  • The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks (Hardback)
zoom

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks (Hardback)

(author), (author)
£120.00
Hardback 896 Pages / Published: 24/11/2003
  • We can order this from the publisher

Usually dispatched within 15 working days

  • This item has been added to your basket
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Publisher: Taylor & Francis Ltd
ISBN: 9780849308888
Number of pages: 896
Weight: 1370 g
Dimensions: 235 x 156 x 44 mm


MEDIA REVIEWS
"By the author's providing a 'hacker' perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. The book [includes] ... a good table of contents that is extensive, very organized and thorough ... . ... [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. ... What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. ... Coupled with good illustrations and detailed explanations[,] this is a great resource for both academic and public libraries."
- E-Streams, Vol. 7, No. 9, Sept. 2004
"Awesome work!"
-Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics
Promo Copy

You may also be interested in...

The Trust Manifesto
Added to basket
Privacy is Power
Added to basket
£14.99
Hardback
Hacking For Dummies
Added to basket
£22.99
Paperback
Poc || Gtfo
Added to basket
£33.99
Hardback
Crime Dot Com
Added to basket
£18.99
Hardback
Mindf*ck
Added to basket
£9.99
Paperback
Click Here to Kill Everybody
Added to basket
Ghost In The Wires
Added to basket
The Cyber Effect
Added to basket
£10.99
Paperback
Cybersecurity Essentials
Added to basket
Nuking the Moon
Added to basket
£9.99
Paperback
Mastering Ethereum
Added to basket
CSS in easy steps
Added to basket
£11.99
Paperback
Privacy
Added to basket
£10.99
Paperback
Permanent Record
Added to basket
£9.99
Paperback

Please sign in to write a review

Your review has been submitted successfully.