Author(s) Name:  David J. Stang, Sylvia Moon
The book shows today-s network administrators how to protect their valuable data from theft and destruction by hackers, viruses, corporate spies, and more.
Bolster your system-s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker-s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks.
Table of Contents
1 Footprinting
2 Scanning
3 Enumeration
4 Hacking Windows
5 Hacking UNIX
6 Cybercrime and Advanced Persistent Threats
7 Remote Connectivity and VoIP Hacking
8 Wireless Hacking
9 Hacking Hardware
10 Web and Database Hacking
11 Mobile Hacking
12 Countermeasures Cookbook
ISBN:  9781568840215
Publisher:   IDG Books
Year of Publication:  1993
Book Link:  Home Page Url