Network hacking continues to be the number one menace for organizations worldwide. In his previous books, "Hack Attacks Revealed" and "Hack Attacks Denied", John Chirillo showed how to fight both standard and never-before-published hacks. In this companion book, he helps readers close remaining security holes by going back to the variations of old hacks that underground hackers are still using to break into corporate networks.
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 23.5 cm
Breite: 19.5 cm
Gewicht
ISBN-13
978-0-471-05589-1 (9780471055891)
Schweitzer Klassifikation
Acknowledgments; A Note to the Reader; Introduction; About the Author; A Historical Synopsis; PART I: THE SEVENTIES; The Beginning of Hacks; PART II: THE EIGHTIES; The Evolution of Hacks; Collected Hacks; Phreaker Philes; Hacker Spies and Virus Hacking; PART III: THE NINETIES; Hacking and Cracking; Phreaking and Virus Hacking; PART IV: THE MILLENNIUM; Hack Progression; Appendix A: Exploits; Appendix B: The TigerTools.net Message Board; Glossary; Index.