Halting the Hacker: A Practical Guide to Computer SecurityPrentice Hall Professional, 2003 - 347 pages
Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet.
The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics. |
Table des matières
IV | 1 |
V | 2 |
VII | 5 |
X | 8 |
XI | 10 |
XIII | 17 |
XIV | 18 |
XV | 20 |
XCVIII | 181 |
XCIX | 182 |
C | 184 |
CI | 187 |
CIV | 189 |
CV | 190 |
CVI | 191 |
CVII | 196 |
XVI | 22 |
XVIII | 24 |
XIX | 26 |
XX | 29 |
XXII | 33 |
XXIII | 39 |
XXV | 43 |
XXVI | 44 |
XXVII | 48 |
XXVIII | 50 |
XXIX | 53 |
XXX | 55 |
XXXI | 56 |
XXXII | 57 |
XXXIII | 59 |
XXXIV | 61 |
XXXVII | 62 |
XXXVIII | 65 |
XXXIX | 68 |
XL | 69 |
XLI | 70 |
XLII | 73 |
XLIII | 74 |
XLIV | 76 |
XLV | 78 |
XLVI | 80 |
XLVII | 83 |
XLVIII | 85 |
L | 87 |
LII | 88 |
LIII | 89 |
LIV | 91 |
LV | 95 |
LVIII | 98 |
LIX | 101 |
LX | 106 |
LXI | 110 |
LXII | 115 |
LXIV | 116 |
LXV | 117 |
LXVI | 120 |
LXVII | 124 |
LXVIII | 127 |
LXIX | 128 |
LXX | 131 |
LXXII | 132 |
LXXIII | 134 |
LXXIV | 135 |
LXXV | 137 |
LXXVI | 138 |
LXXVII | 145 |
LXXIX | 146 |
LXXX | 149 |
LXXXI | 152 |
LXXXII | 154 |
LXXXIII | 157 |
LXXXV | 158 |
LXXXVI | 159 |
LXXXVII | 161 |
LXXXVIII | 163 |
LXXXIX | 166 |
XC | 172 |
XCI | 173 |
XCIV | 175 |
XCV | 177 |
XCVI | 178 |
CIX | 199 |
CX | 200 |
CXI | 201 |
CXII | 203 |
CXIV | 204 |
CXV | 208 |
CXVI | 211 |
CXVII | 215 |
CXVIII | 218 |
CXIX | 221 |
CXXI | 222 |
CXXII | 224 |
CXXIII | 229 |
CXXVI | 232 |
CXXVII | 233 |
CXXVIII | 237 |
CXXX | 239 |
CXXXI | 243 |
CXXXII | 244 |
CXXXIII | 247 |
CXXXV | 248 |
CXXXVI | 251 |
CXXXVII | 252 |
CXXXVIII | 253 |
CXLI | 254 |
CXLII | 255 |
CXLIII | 257 |
CXLIV | 258 |
CXLV | 261 |
CXLVII | 262 |
CXLVIII | 263 |
CXLIX | 265 |
CL | 266 |
CLII | 267 |
CLIII | 269 |
CLVI | 271 |
CLVII | 275 |
CLVIII | 280 |
CLIX | 283 |
CLXIII | 284 |
CLXV | 285 |
CLXVI | 289 |
CLXIX | 291 |
CLXX | 292 |
CLXXI | 294 |
CLXXII | 296 |
CLXXIII | 299 |
CLXXVI | 300 |
CLXXVII | 301 |
CLXXIX | 303 |
CLXXX | 305 |
CLXXXI | 307 |
CLXXXV | 308 |
CLXXXVII | 310 |
CLXXXVIII | 312 |
CLXXXIX | 314 |
CXC | 315 |
CXCI | 317 |
CXCIII | 318 |
CXCV | 319 |
CXCVII | 320 |
CXCIX | 321 |
CC | 323 |
339 | |
Autres éditions - Tout afficher
Halting the Hacker: A Practical Guide to Computer Security Donald L. Pipkin Aucun aperçu disponible - 1997 |