• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    The Hacker's Handbook by Young, Susan; Aitel, Dave;

    The Strategy Behind Breaking into and Defending Networks

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 125.00
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        63 262 Ft (60 250 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 12 652 Ft off)
      • Kedvezményes ár 50 610 Ft (48 200 Ft + 5% áfa)

    63 262 Ft

    db

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadás sorszáma 1
    • Kiadó Auerbach Publications
    • Megjelenés dátuma 2003. november 24.

    • ISBN 9780849308888
    • Kötéstípus Keménykötés
    • Terjedelem894 oldal
    • Méret 234x156 mm
    • Súly 1369 g
    • Nyelv angol
    • Illusztrációk 195 Illustrations, black & white; 246 Tables, black & white
    • 0

    Kategóriák

    Rövid leírás:

    This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

    Több

    Hosszú leírás:

    The Hacker?s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

    This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

    Each section provides a ?path? to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

    ?By the author?s providing a ?hacker? perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. The book [includes] ? a good table of contents that is extensive, very organized and thorough ? . ? [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. ? What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. ? Coupled with good illustrations and detailed explanations[,] this is a great resource for both academic and public libraries.?
    ? E-Streams, Vol. 7, No. 9, Sept. 2004
    ?Awesome work!?
    ?Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics
    Promo Copy

    Több

    Tartalomjegyzék:

    Preface. Case Study in Subversion. Know Your Opponent. Anatomy of an Attack. Your Defensive Arsenal. Programming. The Protocols. Domain Name Service. Directory Services. Simple Mail Transfer Protocol. Hypertext Transfer Protocol. Database Hacking. Malware. Network Hardware. Consolidating Gains. After the Fall. Conclusion.

    Több
    Mostanában megtekintett
    previous
    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    Algebraic Varieties

    Kempf, G.;

    28 847 Ft

    23 078 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    Key Issues in Organizational Communication

    Hargie, Owen; Tourish, Dennis; (ed.)

    96 159 Ft

    76 927 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    The Chemistry and Technology of Pectin

    Walter, Reginald H.; (ed.)

    30 096 Ft

    24 077 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    The Language of Literature

    Beard, Adrian;

    45 543 Ft

    36 435 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    Critical Theory and New Materialisms

    Rosa, Hartmut; Henning, Christoph; Bueno, Arthur; (ed.)

    20 238 Ft

    16 191 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    Applied Molecular Genetics of Fungi

    Peberdy, J. F.; Caten, C. E.; Ogden, Jill E.;(ed.)

    29 859 Ft

    23 888 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    Usability Engineering

    Nielsen, Jakob;

    24 582 Ft

    19 665 Ft

    20% %kedvezmény
    The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

    International Review of Cytology

    Jeon, Kwang W.; (ed.)

    86 961 Ft

    69 569 Ft

    next