Description |
1 online resource |
Series |
Radia Perlman series in computer networking and security |
|
Radia Perlman series in computer networking and security.
|
Bibliography |
Includes bibliographical references and index. |
Contents |
Introduction -- Networking overview: pretty much everything you need to know about networking to follow the rest of this book -- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book -- Phase 1: reconnaissance -- Phase 2: scanning -- Phase 3: gaining access using application and operating system attacks -- Phase 3: gaining access using network attacks -- Phase 3: denial-of-service attacks -- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! -- Phase 5: covering tracks and hiding -- Putting it all together: anatomy of an attack -- The future, references, and conclusions. |
Subject |
Computer networks -- Security measures.
|
|
Data protection.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Protection de l'information (Informatique) |
|
Computer networks -- Security measures. |
|
Data protection. |
|
Computer networks -- Security measures. |
|
Data protection. |
Added Author |
Liston, Tom.
|
Other Form: |
Print version: Skoudis, Ed. Counter hack reloaded. 2nd ed. Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006 (DLC) 2005027164 (OCoLC)61694770 |
ISBN |
9780131481046 |
|
0131481045 |
|
9780132704533 |
|
0132704536 |
|