Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Maximum Security: A Hacker's Guide toProtecting Your Internet Site andNetwork

Beoordeling
-
Verkocht
-
Pagina's
670
Cijfer
A+
Geüpload op
30-09-2022
Geschreven in
2022/2023

Table of Contents: • Introduction I Setting the Stage • Chapter 1 - Why Did I Write This Book? • Chapter 2 - How This Book Will Help You • Chapter 3 - Hackers and Crackers • Chapter 4 - Just Who Can Be Hacked, Anyway? II Understanding the Terrain • Chapter 5 - Is Security a Futile Endeavor? • Chapter 6 - A Brief Primer on TCP/IP • Chapter 7 - Birth of a Network: The Internet • Chapter 8 - Internet Warfare III Tools • Chapter 9 - Scanners • Chapter 10 - Password Crackers • Chapter 11 - Trojans • Chapter 12 - Sniffers • Chapter 13 - Techniques to Hide One's Identity • Chapter 14 - Destructive Devices IV Platforms and Security • Chapter 15 - The Hole • Chapter 16 - Microsoft • Chapter 17 - UNIX: The Big Kahuna MAXIMUM SECURITY : A HACKER'S GUIDE TO PROTECTING YOUR INTERNET SITE AND NETWORK • Chapter 18 - Novell • Chapter 19 - VAX/VMS • Chapter 20 - Macintosh • Chapter 21 - Plan 9 from Bell Labs V Beginning at Ground Zero • Chapter 22 - Who or What Is Root? • Chapter 23 - An Introduction to Breaching a Server Internally • Chapter 24 - Security Concepts VI The Remote Attack • Chapter 25 - The Remote Attack • Chapter 26 - Levels of Attack • Chapter 27 - Firewalls • Chapter 28 - Spoofing Attacks • Chapter 29 - Telnet-Based Attacks • Chapter 30 - Language, Extensions, and Security VII The Law • Chapter 31 - Reality Bytes: Computer Security and the Law VIII Appendixes • Appendix A - How to Get More Information • Appendix B - Security Consultants • Appendix C - A Hidden Message About the Internet • Appendix D - What's on the CD-ROM © Copyright, Angel722 Computer Publishing. All rights reserved. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network Dedication This book is dedicated to Michelle, whose presence has rendered me a prince among men. Acknowledgments My acknowledgments are brief. First, I would like to acknowledge the folks at Sams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible mess. They are an awesome editing team and their expertise is truly extraordinary. Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and Stacie Latreille. These individuals offered critical support, without which this book could not have been written. Also, I would like to recognize the significant contribution made by John David Sale, a network security specialist located in Van Nuys, California. His input was invaluable. A similar thanks is also extended to Peter Benson, an Internet and EDI Consultant in Santa Monica, California (who, incidentally, is the current chairman of ASC X12E). Peter's patience was (and is) difficult to fathom. Moreover, I forward a special acknowledgment to David Pennells and his merry band of programmers. Those cats run the most robust and reliable wire in the southwestern United States. About the Author The author describes himself as a "UNIX propeller head" and is a dedicated advocate of the Perl programming language, Linux, and FreeBSD. After spending four years as a system administrator for two California health-care firms, the author started his own security-consulting business. Currently, he specializes in testing the security of various networking platforms (breaking into computer networks and subsequently revealing what holes lead to the unauthorized entry) including but not limited to Novell NetWare, Microsoft Windows NT, SunOS, Solaris, Linux, and Microsoft Windows 95. His most recent assignment was to secure a wide area network that spans from Los Angeles to Montreal. The author now lives quietly in southern California with a Sun SPARCStation, an IBM RS/6000, two Pentiums, a Macintosh, various remnants of a MicroVAX, and his wife. In the late 1980s, the author was convicted of a series of financial crimes after developing a technique to circumvent bank security in Automatic Teller Machine systems. He therefore prefers to remain anonymous. Tell Us What You Think! As a reader, you are the most important critic and commentator of our books. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. You can help us make strong books that meet your needs and give you the computer guidance you require. Do you have access to the World Wide Web? Then check out our site at . NOTE: If you have a technical question about this book, call the technical support line at or send e-mail to . As the team leader of the group that created this book, I welcome your comments. You can fax, e-mail, or write me directly to let me know what you did or didn't like about this book--as well as what we can do to make our books stronger. Here's the information: FAX: E-mail: Mark Taber Mail: Mark Taber Comments Department Sams Publishing 201 W. 103rd Street Indianapolis, IN 46290 Introduction I want to write a few words about this book and how it should be used. This book is not strictly an instructional, or "How To" book. Its purpose is to get you started on a solid education in Internet security. As such, it is probably constructed differently from any computer book you have ever read. Although this book cannot teach you everything you need to know, the references contained within this book can. Therefore, if you know very little about Internet security, you will want to maximize the value of this book by adhering to the following procedure:

Meer zien Lees minder
Instelling
CS101
Vak
CS101











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CS101
Vak
CS101

Documentinformatie

Geüpload op
30 september 2022
Aantal pagina's
670
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€7,47
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
bmm7203 Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
106
Lid sinds
4 jaar
Aantal volgers
81
Documenten
786
Laatst verkocht
1 maand geleden

3,1

25 beoordelingen

5
9
4
3
3
3
2
1
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen