• Tous les prix incluent la TVA.
Il ne reste plus que 2 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Hacking Exposed: Network ... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Britbooksfr
État: D'occasion: Bon
Commentaire: Simplement Brit: Nous avons envoyé dans nos livres d'entrepôts britanniques du bon état de plus de 1 million de clients satisfaits à travers le monde. nous nous engageons à vous fournir un service fiable et efficace à tout moment.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Hacking Exposed: Network Security Secrets and Solutions (Anglais) Broché – 20 décembre 2000


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 42,87
EUR 34,30 EUR 3,54

Il y a une édition plus récente de cet article:


Offres spéciales et liens associés


Descriptions du produit

Book by Joel Scambray Stuart McClure George Kurtz

Détails sur le produit


Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 41 commentaires
78 internautes sur 81 ont trouvé ce commentaire utile 
This is the book to use for penetration testing and analysis 21 décembre 2000
Par Ben Rothke - Publié sur Amazon.com
Format: Broché
Hardly a week goes by that CNN does not report a high-profile Web site being defiled or an e-commerce site being penetrated. While most people know why these incidents occurred, Hacking Exposed explains how they occurred and, more important, how to prevent them from occurring.
The cover of Hacking Exposed announces that "Network security is Y2K without the deadline." That alarmist statement, however, is the only hype in the book. The work is packed with real-world examples and links to tools needed to assess the security of any type of client/server and Web system. As they detail the myriad vulnerabilities in different types of systems, the authors provide countermeasures for each of them.
Well organized, the book progresses in an orderly fashion. It methodically goes through the process of exploiting a target to penetrate a system--from identification and enumeration to actual penetration. The authors provide detailed instructions and explanations for many security features and flaws in Unix, Linux, Windows, NetWare, routers, firewalls, and more. Topics covered include state-of-the-art computer and network penetration, as viewed by both the attacker and the defender; remote system identification; vulnerability identification; war dialers; firewall circumvention; and denial-of-service attacks. An appendix explores the security characteristics of Windows 2000.
Some may argue that books such as this one only serve to motivate and educate hackers. The truth is that hackers are already aware of the book's contents. This book is designed for system administrators and managers who need to know their systems' risks and vulnerabilities and how to address them. When they are done with this book, system administrators and managers will be familiar with such critical topics as back channels, port redirection, banner grabbing, and buffer overflows. Hacking Exposed is a must-read for anyone who wants to know what is really happening on their network....
47 internautes sur 50 ont trouvé ce commentaire utile 
Still the best for vulnerability assessment and pen testing 11 avril 2001
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
I am a senior engineer for managed network security operations, which includes conducting vulnerability assessments against client networks. I read this second edition to gain insights into ways to better assess a client's security posture, and also to understand some of the attacks I see while monitoring intrusion detection systems. Of the books I've read, Hacking Exposed remains the best guide to systematically assess and (if necessary) compromise hosts. By understanding black hat methods, defenders can better prepare for the tidal wave of exploits washing upon the networking shore.
Parts I (Casing the Establishment), II (System Hacking), and III (Network Hacking) are a tour-de-force of attacker tools and techniques. While explaining how to penetrate systems, the authors spend a fair amount of time explaining how those systems work. From a system administration standpoint, these descriptions are pure gold. Since the authors are fairly operating system-agnostic, they show the pros and cons of Microsoft, UNIX, and Novell products in the harsh light of improved security. For example, the discussion of file handles, file descriptors, and signals in chapter 8 ("Hacking UNIX") helped me understand a little bit of UNIX's guts, while giving a security spin to file system operations.
Thankfully, Hacking Exposed gives Microsoft operating systems plenty of attention. While recognizing that many of us dislike administering these systems, the authors provide helpful and solid chapters on Windows NT and Windows 2000. They also demonstrate many ways to use Windows as an attack platform. They convincingly show that if a scan can be performed in Linux, someone has developed a similar tool for Windows.
My favorite issues in the book involved describing Windows rootkits (a recent development) and UNIX loadable kernel modules. On the negative side, I felt the book lost steam in section IV (Software Hacking), spending too much time repeating earlier material. Also, unless you're a relative newbie to security, you may become bored with the litany of historic deficiencies and required patches discussed in section IV.
Overall, the second edition of Hacking Exposed remains a must-read book for security professionals. I recommend it as the sort of book one reads after gaining an overall sense of the security field and learning about TCP/IP. With those foundations in place, it's time to learn how black hats operate. If you're a system administrator, you'll learn how to fortify your network assets. If you're an intrusion detector, you'll learn what to watch for. If you're a pen-tester, you'll learn how to compromise hosts. Who could ask for more?
28 internautes sur 29 ont trouvé ce commentaire utile 
Impressive follow-up edition 26 octobre 2000
Par Un client - Publié sur Amazon.com
Format: Broché
I read the first edition and thought it was a great book that every administrator should have. I didn't think that they would come out with a second edition so quickly. I am impressed that the second edition isn't just a rehash of the same material. It is filled with new information that is a must have for security minded administrators. The application hacking information is the wave of the future.
We have had consultants come in to perform work for our company who have carried the first edition in hand to perform security reviews for us. I can't wait to see how long it takes them to bring in the second edition. Its amazing how the authors share this great information with their competitors. The authors are keeping the competition on their toes and increasing the general knowledge of security for the whole industry.
Keep it coming guys!
17 internautes sur 19 ont trouvé ce commentaire utile 
ANYTHING EXCEPT 5 STARS IS UNFAIR. 12 juin 2001
Par Yevgeniy Mishchenko - Publié sur Amazon.com
Format: Broché
Guys! This is a starter book. Get real!
-(1)- Many readers complain that it does not have enough detail (Specific and new hacks, deep description of protocols, for example). But this piece was not written for this. You can't blame a chicken for not giving you milk. This is an overview book, which can't cover everything physically, it is thick enough already, giving a very good general notion of the field. -(2)- Same readers take stars from the book for "containing only links, not much else". But that's the point! Just follow references, they are very useful. It is the only way to find fresh and profound material. Guys, who expect to find everything in one book are just lazy and unprofessional people, who bought it to play around with neighbour's PC or some box on the web. -(3)- "I bought the book, but it turned out to be useless :( ". Shure it did. You didn't check table of contents and reviews. But that's not the author's fault, don't take off stars.
33 internautes sur 42 ont trouvé ce commentaire utile 
Whhheeerrreeesss The BEEF? 5 mai 2001
Par Un client - Publié sur Amazon.com
Format: Broché
i have been in the comminications field for 13 years now. this book reviewed like it was one of the best out there for hacking methods and vulnerabilities and i thought it would compliment my library. after going through about a third of the book, i now know it is poor. this book is nothing more than a internet directory listing for hack sites and software. it gives no detail at all. it explains next to nothing. where as i was looking for actual mechanics for attacks, to include protocols and logic, this book simply references web site, after site, after site. i would not even recommend this book for a beginner due to no depth. you could do better pointing your browser to the internet than read this book (well, the book does pretty much tell you to go to the internet). look elsewhere, even if you are looking for a starter book on the topic.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?