Halting the Hacker: A Practical Guide to Computer Security

Couverture
Prentice Hall Professional, 2003 - 347 pages

  • Get into the hacker's mind--and outsmart him!
  • Fully updated for the latest threats, tools, and countermeasures
  • Systematically covers proactive, reactive, and preemptive security measures
  • Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems
"Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard

Secure your systems against today's attacks--and tomorrow's.

Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system.

Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet.

  • How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection
  • How multiple subsystems can be used in harmony to attack your computers and networks
  • Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system
  • How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux
  • Systematic proactive, reactive, and preemptive security measures
  • Security testing, ongoing monitoring, incident response, and recovery--in depth
  • Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution
About the CD-ROM

The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.

 

Table des matières

IV
1
V
2
VII
5
X
8
XI
10
XIII
17
XIV
18
XV
20
XCVIII
181
XCIX
182
C
184
CI
187
CIV
189
CV
190
CVI
191
CVII
196

XVI
22
XVIII
24
XIX
26
XX
29
XXII
33
XXIII
39
XXV
43
XXVI
44
XXVII
48
XXVIII
50
XXIX
53
XXX
55
XXXI
56
XXXII
57
XXXIII
59
XXXIV
61
XXXVII
62
XXXVIII
65
XXXIX
68
XL
69
XLI
70
XLII
73
XLIII
74
XLIV
76
XLV
78
XLVI
80
XLVII
83
XLVIII
85
L
87
LII
88
LIII
89
LIV
91
LV
95
LVIII
98
LIX
101
LX
106
LXI
110
LXII
115
LXIV
116
LXV
117
LXVI
120
LXVII
124
LXVIII
127
LXIX
128
LXX
131
LXXII
132
LXXIII
134
LXXIV
135
LXXV
137
LXXVI
138
LXXVII
145
LXXIX
146
LXXX
149
LXXXI
152
LXXXII
154
LXXXIII
157
LXXXV
158
LXXXVI
159
LXXXVII
161
LXXXVIII
163
LXXXIX
166
XC
172
XCI
173
XCIV
175
XCV
177
XCVI
178
CIX
199
CX
200
CXI
201
CXII
203
CXIV
204
CXV
208
CXVI
211
CXVII
215
CXVIII
218
CXIX
221
CXXI
222
CXXII
224
CXXIII
229
CXXVI
232
CXXVII
233
CXXVIII
237
CXXX
239
CXXXI
243
CXXXII
244
CXXXIII
247
CXXXV
248
CXXXVI
251
CXXXVII
252
CXXXVIII
253
CXLI
254
CXLII
255
CXLIII
257
CXLIV
258
CXLV
261
CXLVII
262
CXLVIII
263
CXLIX
265
CL
266
CLII
267
CLIII
269
CLVI
271
CLVII
275
CLVIII
280
CLIX
283
CLXIII
284
CLXV
285
CLXVI
289
CLXIX
291
CLXX
292
CLXXI
294
CLXXII
296
CLXXIII
299
CLXXVI
300
CLXXVII
301
CLXXIX
303
CLXXX
305
CLXXXI
307
CLXXXV
308
CLXXXVII
310
CLXXXVIII
312
CLXXXIX
314
CXC
315
CXCI
317
CXCIII
318
CXCV
319
CXCVII
320
CXCIX
321
CC
323
CCI
339
Droits d'auteur

Autres éditions - Tout afficher

Expressions et termes fréquents

À propos de l'auteur (2003)

DONALD L. PIPKIN, CISSP, is an Information Security Architect for the Internet Security Division of Hewlett-Packard who consults with many of HP's largest customers. An internationally renowned security expert with over 15 years of experience, Pipkin is a frequent speaker and presenter on security issues in regional, national, and international conferences. His areas of expertise include policy, procedures, and intrusion response. He is author of Information Security: Protecting the Global Enterprise.

Informations bibliographiques