• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    The Hacker's Handbook by Young, Susan; Aitel, Dave;

    The Strategy Behind Breaking into and Defending Networks

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 125.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        63 262 Ft (60 250 Ft + 5% VAT)
      • Discount 20% (cc. 12 652 Ft off)
      • Discounted price 50 610 Ft (48 200 Ft + 5% VAT)

    63 262 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

    More

    Long description:

    The Hacker?s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

    This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

    Each section provides a ?path? to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

    ?By the author?s providing a ?hacker? perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. The book [includes] ? a good table of contents that is extensive, very organized and thorough ? . ? [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. ? What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. ? Coupled with good illustrations and detailed explanations[,] this is a great resource for both academic and public libraries.?
    ? E-Streams, Vol. 7, No. 9, Sept. 2004
    ?Awesome work!?
    ?Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics
    Promo Copy

    More

    Table of Contents:

    Preface. Case Study in Subversion. Know Your Opponent. Anatomy of an Attack. Your Defensive Arsenal. Programming. The Protocols. Domain Name Service. Directory Services. Simple Mail Transfer Protocol. Hypertext Transfer Protocol. Database Hacking. Malware. Network Hardware. Consolidating Gains. After the Fall. Conclusion.

    More