Error title
Some error text about your books and stuff.
Close

Counter Hack: a Step-by-Step Guide to Computer Attacks and Effective Defenses

by Skoudis, Edward

  • ISBN: 9780130332738
  • ISBN10: 0130332739

Counter Hack: a Step-by-Step Guide to Computer Attacks and Effective Defenses

by Skoudis, Edward

  • Binding: Paperback
  • Edition: 1
  • Publisher: Prentice Hall PTR
  • Publish date: 07/23/2001
  • ISBN: 9780130332738
  • ISBN10: 0130332739
used Add to Cart $7.72
You save: 86%
Marketplace Item
Product notice Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
new Add to Cart $66.63
Marketplace Item
Product notice Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
Description: The Next Generation Hacker BookThe step-by-step guide to defending against hacker intrusions!Defend against today's most powerful hacker attacks!Hands-on, step-by-step techniques for UNIX/Linux and Windows environmentsIntrusion detection: New evasion techniques--and countermeasuresBy the security expert who demonstrated hacking to the U.S. Senate!This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets--whether or not they have security experience. In "Counter Hack," leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more: Know your adversary: from script kiddies to elite attackersA hacker's view of networks, TCP/IP protocols, and their vulnerabilitiesFive phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detectionThe most dangerous and widespread attack scenarios--explained in depthKey hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and moreHow hackers build elegant attacks from simple building blocksDetecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks How hackers cover their tracks--and how you can uncover their handiworkA preview of tomorrow's hacker tools, attacks, and countermeasuresWhatever your role in protecting networkinfrastructure and data, Counter Hack delivers proven solutions you can implement right now--and long-term strategies that will improve security for years to come.
Expand description
Product notice Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
Seller Condition Comments Price  
Seller: HPB-Red
Location: Dallas, TX
Condition: Good
Shipping Icon
Connecting readers with great books since 1972! Used textbooks may not
[...]
Price:
$7.72
Comments:
Connecting readers with great books since 1972! Used textbooks may not
[...]
Seller: Wonder Book - Member ABAA/ILAB
Location: Frederick, MD
Condition: Very Good
Very Good condition. A copy that may have a few cosmetic defects. May also
[...]
Price:
$8.03
Comments:
Very Good condition. A copy that may have a few cosmetic defects. May also
[...]
Seller: h&hbooks24
Location: Saint Louis, MO
Condition: Good
Shipping Icon
Size: 9x7x1;
Price:
$26.23
Comments:
Size: 9x7x1;
Seller: GridFreed
Location: North Las Vegas, NV
Condition: New
Size: 9x7x1; New. In shrink wrap. Looks like an interesting title!
Price:
$66.63
Comments:
Size: 9x7x1; New. In shrink wrap. Looks like an interesting title!
please wait
Please Wait

Notify Me When Available

Enter your email address below,
and we'll contact you when your school adds course materials for
.
Enter your email address below, and we'll contact you when is back in stock (ISBN: ).