A Hackers Guide to Protecting Your Internet Site and Network [h33t] [Ahmed] [.pdf]

seeders: 2
leechers: 0
Added on March 13, 2009 by in Books
Torrent verified.



A Hackers Guide to Protecting Your Internet Site and Network [h33t] [Ahmed] [.pdf] (Size: 2.6 MB)
 A Hackers Guide to Protecting Your Internet Site and Network.pdf2.6 MB
 Ahmed [MakaveliTheDon].txt5.39 KB
 All My Torrents - Hacks - Softwares - Albums - Books - PSP - Pictures -.url285 bytes
 tracked_by_h33t_com.txt23 bytes


Description

http://3.bp.blogspot.com/_lw-1aWVM-dc/SOn8Xv9h89I/AAAAAAAAAik/37zE33jXaWY/s400/1575212684.01._SS500_SCLZZZZZZZ_V1056522055_.gif.jpg
/>
-----------------------------------------------------

Table of Contents:



*Introduction



I Setting the Stage



*Chapter 1 - Why Did I Write This Book?

*Chapter 2 - How This Book Will Help You

*Chapter 3 - Hackers and Crackers

*Chapter 4 - Just Who Can Be Hacked, Anyway?



II Understanding the Terrain



*Chapter 5 - Is Security a Futile Endeavor?

*Chapter 6 - A Brief Primer on TCP/IP

*Chapter 7 - Birth of a Network: The Internet

*Chapter 8 - Internet Warfare



III Tools



*Chapter 9 - Scanners

*Chapter 10 - Password Crackers

*Chapter 11 - Trojans

*Chapter 12 - Sniffers

*Chapter 13 - Techniques to Hide One's Identity

*Chapter 14 - Destructive Devices



IV Platforms and Security



*Chapter 15 - The Hole

*Chapter 16 - Microsoft

*Chapter 17 - UNIX: The Big Kahuna

*Chapter 18 - Novell

*Chapter 19 - VAX/VMS

*Chapter 20 - Macintosh

*Chapter 21 - Plan 9 from Bell Labs



V Beginning at Ground Zero



*Chapter 22 - Who or What Is Root?

*Chapter 23 - An Introduction to Breaching a Server Internally

*Chapter 24 - Security Concepts



VI The Remote Attack



*Chapter 25 - The Remote Attack

*Chapter 26 - Levels of Attack

*Chapter 27 - Firewalls

*Chapter 28 - Spoofing Attacks

*Chapter 29 - Telnet-Based Attacks

*Chapter 30 - Language, Extensions, and Security



VII The Law



*Chapter 31 - Reality Bytes: Computer Security and the Law



VIII Appendixes



*Appendix A - How to Get More Information

*Appendix B - Security Consultants

*Appendix C - A Hidden Message About the Internet

-----------------------------------------------------

Enjoy!

-----------------------------------------------------

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
2.6 MB
seeders:2
leechers:0
A Hackers Guide to Protecting Your Internet Site and Network [h33t] [Ahmed] [.pdf]