ou
Identifiez-vous pour activer la commande 1-Click.
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Dites-le à l'éditeur :
J'aimerais lire ce livre sur Kindle !

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Hacking Exposed Windows 2000: Network Security Secrets & Solutions [Anglais] [Broché]

Joel Scambray , Stuart McClure

Prix : EUR 38,95 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Temporairement en rupture de stock.
Commandez maintenant et nous vous livrerons cet article lorsqu'il sera disponible. Nous vous enverrons un e-mail avec une date d'estimation de livraison dès que nous aurons plus d'informations. Cet article ne vous sera facturé qu'au moment de son expédition.
Expédié et vendu par Amazon. Emballage cadeau disponible.

Offres spéciales et liens associés


Détails sur le produit


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Première phrase
It's hard to talk about any system in a vacuum, especially one that is so widely deployed in so many roles as Windows 2000. Lire la première page
En découvrir plus
Concordance
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Vendre une version numérique de ce livre dans la boutique Kindle.

Si vous êtes un éditeur ou un auteur et que vous disposez des droits numériques sur un livre, vous pouvez vendre la version numérique du livre dans notre boutique Kindle. En savoir plus

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.9 étoiles sur 5  23 commentaires
25 internautes sur 28 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The "Hacking Exposed" series scores a hat trick 10 octobre 2001
Par Richard Bejtlich - Publié sur Amazon.com
Format:Broché
I am a senior engineer for network security operations. I read "Hacking Exposed Windows 2000" ("HEW2K") to learn how adversaries compromise Windows hosts. Like the original "Hacking Exposed" (now in a third edition) and the newer "Hacking Linux Exposed," HEW2K delivers no-nonsense, high-impact security information. I give all three books my highest recommendation.

Having read the original "Hacking Exposed" in Oct 99, I knew the authors possessed strong Windows security and administration skills. HEW2K gives the Foundstone crew a way to share their knowledge with the world. Thankfully, HEW2K doesn't repeat information found in the general-purpose "Hacking Exposed." For example, HEW2K covers Windows-specific denial of service issues, but directs readers to "Hacking Exposed, Third Edition" for a broader description of DoS. The same approach is taken with social engineering and dial-up security.

The "Hacking Exposed" series differ from the "Maximum Security" and "Hack Proofing" titles. While the latter are predominantly defensive-minded, HEW2K and its cousins are more offensive in nature. Vulnerability assessors and penetration testers will appreciate this focus. I was able to immediately apply tools and techniques in HEW2K to discover at-risk hosts on client networks.

HEW2K continues to offer the best combination of command-line examples, screen shots, and sample output of any security books I've read. I could literally read, type commands, and check results against the material in HEW2K. Furthermore, HEW2K covers topics given little attention elsewhere; these include attacking and defending SQL Server, Terminal Services, and client applications. HEW2K also gives enough background on each topic, like ISAPI filters or ASP, to give unfamiliar readers enough context to understand security implications of these technologies.

HEW2K is another must-buy from Osborne McGraw-Hill. As Foundstone principles, the authors ride the cutting edge of security developments. They recognize and communicate that application security (IIS, SQL Server, etc.) is the target of choice as administrators lock down layer 4 and below. With its clear methodology, expert explanations, and inside tips, HEW2K easily differentiates itself from the pack. We readers benefit, and hopefully our adversaries will not.

(Disclaimer: I received a free review copy from the publisher.)
11 internautes sur 11 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent and timely 10 septembre 2001
Par Simple Nomad - Publié sur Amazon.com
Format:Broché
Extremely well organized and presented in an easy-to-grasp way, Hacking Windows 2000 Exposed will have the novice's jaws dropping, yet even the seasoned Win2K expert will raise an eyebrow (or both). The latest hacks and cracks are explained in detail, allowing the admin to really and truly see what they are up against and why security is so important to ANY computer attached to a network. I highly recommend that before you attach a Windows 2000 system to the Internet, read this book and test your system's security fully -- before an unwanted intruder does.
12 internautes sur 13 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 One of the few GREAT Win2k Books of all time! 4 février 2002
Par Tom Shinder - Publié sur Amazon.com
Format:Broché|Achat vérifié
I've read a number of Win2k Security and hacking books, and up to this point have been uniformly unimpressed. Most of these books talk about the theory behind various security concepts, such as how Kerberos works, how IPSec works on the packet level, etc. While this is important information, it doesn't help the working network engineer and admin with the practical aspects of securing the enterprise network.
Hacking Exposed Win2k breaks the mold for Windows Security books. Every few pages you'll find an Aha! experience. I'm happy with a book that provides one or two of these. This book has hundreds of them! You can use the information IMMEDIATELY. You don't have to translate "propeller head" language into action. They give you the actions in plain English.
What's truly remarkable is that these guys *are* propeller heads, but can write so a normal person not only understands, but enjoys, what they have to say! A very rare talent.
EVERYONE who runs a Win2k network needs this book. Get it and you'll not be disappointed. I'd give it 10 stars if I could.
7 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Windows security demystified! 11 novembre 2002
Par Steven L. Umbach - Publié sur Amazon.com
Format:Broché
How do these hackers find my Windows network? What info can they get? How do they actually "connect" and compromise my system? Can I do anything about it? Will it be hard, expensive or will I have to hire somebody or maybe will just a firewall do? What is this netbios thing anyhow? If you have questions like this then this book is for you. Hacking Windows 2000 Exposed is not a book about building a bastion host, configuring a firewall, or encryption theory. It does however show in a very understandable way how "hackers" use common system utilities(netstat,net,nslookup,etc)and free tools(superscan,etc) to find weaknesses in a network or computer and exploit them for fun or profit. I think Microsoft has gotten a bad rap about producing insecure operating systems. Fact is that Windows 2000 can be VERY secure, but by default it is configured for ease of use and backwards compatability (that is changing in .NET Server). Equipped with the right knowledge such as this book, and being serious about taking the time and effort to do something, the vast majority of hack attacks will be stopped cold. 99.9% of hackers are unsophisticated and exploit common weaknesses and negligence. As the book explains weak passwords, no account lockout policy, lack of physical security, and using file and print sharing carelessly are still the biggest problems. However of course there are MANY other issues that need to be dealt with.
Hacking Windows 2000 Exposed is very well organized. It takes you through the steps of how someone actually compomises a system and what you can do about it. It puts you in the mindset of a hacker and their methodology - finding a network, extracting information about it, attempting the connect/attack, gaining access, trying to get system or administrator access, reaking havok, and covering their tracks - maybe even leaving a backdoor for remote control! This approach to writing the book will leave you well prepared to defend yourself, audit activity, and show you how to test your own network for vulnerability. You will learn about netbios, network utilities, authentication
protocols, ports, services, anonymous access, permissions, sniffers - how they can be used against you, what to do about it and a whole lot more. The first part of the book focuses on the Windows 2000 operating system. Later chapters focus on applications such as Internet Information Server, SQL, and Internet Explorer(including some great tips everyone can use) and tells you how to manage them for maximum security. The end of the book covers specific security features of Windows 2000 such as Ipsec, Efs, group policy, seurity templates, and how to use them. Appendix A is a concise summary on how to lock down your Windows 2000 computer - a recap of concepts covered throughout the book. Each chapter also has a very helpful summary at the end that reinforces what was covered(specifically the actions to take) in case you are overwhelmed by technical detail in the reading. I like to periodically go back and leaf through the chapter summaries as kind of a refresher course of the meat of what is covered in the book. There is a list of references of other books and internet sites for further reading if more info is desired of material covered in each chapter. I highly recommend Hacking Windows 2000 Exposed to anyone intested in protecting their network and computers from unauthorized access - even those who have just a few computers at home and a cable/dsl connection should take heed. The writing style assumes you have some basic understanding of networking but is definitely not just for techies and keeps your interest. For many this could be their only book about network security and others their first book or a must have addition.
4 internautes sur 4 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 So you think your website is secure? 6 avril 2002
Par Amazon Customer - Publié sur Amazon.com
Format:Broché
When I started reading, I could not put the book down. Very easy to read and very eye opening. I really like how they offer tools and present actual code in action. HOWEVER, fortunately for us, the book is dated. Microsoft released the URLSCAN utility that "countermeasures" most of the IIS 5 related chapter. This utility is not mentioned. I suspect each chapter has a rollup patch from microsoft for same. BUT, knowing what the patches are actually attempting to do is the very best part of this book. This book is a must read for anyone who thinks their websvr or AD setup is secure. Even if you confirm there are ZERO holes, the process to reach that conclusion will be an education in itself and this book is the teacher.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?