Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. It includes chapters which are organized around specific components and tasks.
Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.
"By the author's providing a 'hacker' perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. The book [includes] ? a good table of contents that is extensive, very organized and thorough ? . ? [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. ? What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. ? Coupled with good illustrations and detailed explanations[,] this is a great resource for both academic and public libraries." - E-Streams, Vol. 7, No. 9, Sept. 2004 "Awesome work!" -Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics Promo Copy