Added on March 13, 2009 by in Books Torrent verified.
Description
http://img236.imageshack.us/img236/1018/hackersbewareyv6.jpg
/>
-----------------------------------------------------
This book gives you an insight into hackers and how to protect against them. By understanding how attacks work and what a hacker does to compromise a machine, a company can properly protect itself. The methods employed by attackers in exploits such as gaining access, simplifying gaining access, taking a system offline and desensitising sensitive information are discussed in detail. There are chapters on: information-gathering, spoofing (altering your identity), session hijacking (taking over an existing session to bypass a password), 'denial of service' attacks (which prevent people accessing your service), buffer overflow attacks (when an attacker attempts to store too much information), password security and password crackers, specific exploits for Unix, NT, how an attacker preserves access to a system, , covering tracks, and the top 10 exploits for a company that is connected to the internet to fix. The appendix contains useful urls for information on hacking and security.
-----------------------------------------------------
Enjoy!
-----------------------------------------------------
Related Torrents
torrent name |
size |
seed |
leech |
|
4.32 MB |
0 |
1 |
|
4.9 MB |
1 |
0 |
Sharing Widget
|