Acheter d'occasion
EUR 4,29
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Bon | Détails
Vendu par momox fr
État: D'occasion: Bon
Commentaire: Plus d'un million de clients satisfaits. Vendu par momox, professionnel de la vente en ligne d'articles culturels d'occasion. Prix compétitifs jusqu'à -80% du prix neuf.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Hacking Exposed: Network Security Secrets and Solutions (Anglais) Broché – 1 octobre 1999

5.0 étoiles sur 5 1 commentaire client

Voir les 4 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
"Veuillez réessayer"
EUR 22,09 EUR 4,29

Il y a une édition plus récente de cet article:

rentrée scolaire 2017 rentrée scolaire 2017

click to open popover

Offres spéciales et liens associés

Description du produit

Hacking Exposed High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché
A la fois général et très complet, ce livre est le 'must have' des livres sur la sécurité informatique. Il présente a la fois la sécurité des machines isolées, des réseaux entiers, et des divers systèmes d'exploitation. Il montre de facon explicite le cheminemant que prennent certaint 'pirates' pour mettre a mal l'intégrité d'un réseau et donne des solutions viables pour s'en protéger. Tout administrateur ou personne interessée par la sécurité informatique se doit de le posséder !
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards) 3.9 étoiles sur 5 61 commentaires
57 internautes sur 57 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Everyone who owns a computer should have this book 19 juin 2000
Par Ryan - Publié sur
Format: Broché
This is an excellent book on computer and network security. I thought I new a lot about the subject, but after reading this book from cover to cover I know how much work I need to do to secure my networks. The book is packed with real-world scenarios and up to date information and tools (or links to tools) needed to hack into virtually any type of system. Fortunately, the authors wisely chose to provide countermeasures for each hack listed, which is invaluable to anyone who's livelihood involves maintaining networks. The organization of the book is excellent - it takes you through the steps needed to hack a system, from identification and enumeration to actual penetration, but also allows the advanced reader to quickly find system specific information or methods. Several appendixes are loaded with links to security sites and tools, legal information, and even common port lists. A must read for anyone who owns a computer; you will realize how vulnerable you really are.
49 internautes sur 49 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 About time someone knew what they were writing about 14 septembre 2000
Par Travis Owens - Publié sur
Format: Broché Achat vérifié
I've read about 4 security books and this book was far better than the rest. Instead of simply telling you not to run a certain service cuz it might have a hole, it actually tells you what the hole is, how to exploit it, and where to get the tools you need to exploit it. This isn't a list of programs and their holes though, it starts at the begining teaching you how to enumarate (get info) from a computer from all kinds of different methods, such as trying to find out OSs, their versions, services that are running and who is currently on the system. It talks about scanning groups of computers to find the few that are exploitable. It then goes on to explain specific Windows9X holes, then NT, to Novell, and then to Unix. Spending upto 60 pages on each operating system (very in depth and all of it usefull). There are also chapters just on dialup and VPNs (virtual private networks), firewalls, network hardware (routers) and an entire chapter just about DoS's (Denial of Services). It then goes into Advance Techniques, problems with PHP and ASP, and then onto a chapter on Windows2000 (talk about being up to date). As far as my book collection goes, this definetly gets my Top5 rating of the 100+ books I've read. Theres alot of meat to eat in this book.
7 internautes sur 7 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Good read - good info on hacker defense 18 août 2000
Par G. Carroll - Publié sur
Format: Broché Achat vérifié
The book is a good read and has many interesting examples of hacker attacks and tools. I'm an MCSE and a webserver administrator so I felt compelled to try all these hacking techniques on my servers and colleagues servers. The actual hacking techniques are over simplified and generally do not offer a casual hacker (non leet hacker) any opportunity to compromise you system. Only a way to impress their friends by saying - look I can tell what ports are open on this machine or look I can tell what operating system they are running etc. The explainations of defenses from these hacker probes and attacks I thought were very useful. The defenses are clear and relatively easy to implement. If you are paranoid - or take substantial pride in keeping hackers out of your system - definitley read this book. If you are generally interested in network WAN security, read this book.
13 internautes sur 13 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Not for civilians 18 juillet 2000
Par dlcochrane - Publié sur
Format: Broché Achat vérifié
I purchased this book to educate myself on threats to networks. Although I have a strong computing background (degree in computational chemistry, 20+ years application programming), my network weakness made this book virtually incomprehensible.
It is laid out much like a dictionary where an attack is listed along with its popularity, simplicity, impact and risk rating. What usually follows is a very technical discussion of the attack and possible counter measures.
I suspect that this book would be a great use to network and system administrators, but I also suspect few others will get much out of it.
5.0 étoiles sur 5 This is a great book as are the other editions in the series 4 juillet 2014
Par Kim A. Barber - Publié sur
Format: Broché Achat vérifié
This is a great book as are the other editions in the series. I just bought this to add to my library.
Ces commentaires ont-ils été utiles ? Dites-le-nous