Hacking Exposed
McGraw-Hill Professional (Verlag)
978-0-07-212748-5 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
The best way to protect a system is to understand all the ways hackers can break into it: Hacking Exposed shows administrators how the flaws and loopholes in security technologies can be exploited, and provides security solutions. This edition is updated with new pages to cover the hacks you've been reading about--DoS attacks, Linux hacks, e-mail security holes, cracking passwords, back doors. Through elements such as case studies, risk ratings, attacks & countermeasures, the authors provide specific solutions on how to combat hackers and prevent their attacks. The companion Web site contains custome scripts and links to tools that help administrators tes their security measures. The authors are recognised security experts, having appeared on national print, TV, radio, and on-line media.
Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group. He has assisted companies ranging from newly minted startups to members of the Fortune 50 in addressing information security challenges and opportunities for over a dozen years. Joel's background includes roles as an executive, technical consultant, and entrepreneur. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Joel also co-founded security software and services startup Foundstone, Inc. He has also held positions as a Manager for Ernst & Young, Chief Strategy Officer for Leviathan, security columnist for Microsoft TechNet, Editor at Large for InfoWorld Magazine, and director of IT for a major commercial real estate firm. Joel has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM), as well as organizations including CERT, CSI, ISSA, ISACA, SANS, private corporations, and government agencies such as the Korean Information Security Agency (KISA), FBI, and the RCMP. Joel Scambray is the co-author of all 6 editions of Hacking Exposed. He is also the lead author of Hacking Exposed Windows and Hacking Exposed Web Applications. Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004. Stuart is the lead author and original founder of the Hacking Exposed series of books and has been hacking for the good guys for over 25 years. Widely recognized and asked to present his extensive and in-depth knowledge of hacking and exploitation techniques, Stuart is considered one of the industrys leading authorities on information security risk today. A well-published and acclaimed security visionary, McClure brings a wealth of technical and executive leadership with a profound understanding of both the threat landscape and the operational and financial risk requirements to be successful in todays world. Stuart is often quoted in most all mainstream news outlets. George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfees Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfees CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.
Casing the Establishment. Footprinting. Scanning. Enumeration. System Hacking. Hacking the Consumer: Win9x, Web Browsers, E-mail Clients, & Broadband Internet Access. Hacking Windows NT. Hacking Windows 2000. Novell Netware Hacking. UNIX. Network Hacking. Dial-Up & VPN Hacking. Network Devices. Firewalls. Denial of Service (DoS) Attacks. Remote Control Insecurities. Advanced Techniques. Web Hacking. Appendices: A: Ports. B: Hacking with the Windows NT/2000 Command Shell. C: Resources and Links. D: Tools. E: Top 14 Security Vulnerabilities. F: About the Companion Website.
Erscheint lt. Verlag | 16.11.2000 |
---|---|
Zusatzinfo | 1, black & white illustrations |
Sprache | englisch |
Maße | 180 x 231 mm |
Gewicht | 1440 g |
Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 0-07-212748-1 / 0072127481 |
ISBN-13 | 978-0-07-212748-5 / 9780072127485 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich