Your Ad Here

Friday, July 4, 2008

McGraw Hill - Hacking Exposed - Download ebook

ebook info;
Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo
Wiley Publications
ebook format: PDF
ISBN-10: 0-471-41624-X

The primary objective of this book is to lay a solid foundation from which to explore the world of security. Simply, this book tells the truth about hacking, to bring awareness about the so-called Underground, the hacker’s community, and to provide the tools for doing so.
The book is divided into six parts:
· Part 1: In the Beginning
· Part 2: Putting It All Together
· Part 3: Uncovering Vulnerabilities
· Part 4: Hacking Security Holes
. Part 5: Vulnerability Hacking Secrets
. Part 6: The Hacker’s Toolbox
Evaluators of this book have suggested that this book it may become a required reference for managers, network administrators (CNAs, MCPs), network engineers (CNEs, MCSEs), internetworking engineers (CCNA/P, CCIEs), even interested laypeople. The material in this book will give the members in each of these categories a better understanding of how to hack their network vulnerabilities.
Download this book in digital format.

When a tree falls in the forest and no one is around to hear it, it certainly makes a sound. But if a computer network has a security vulnerability and no one knows about it, is it insecure? Only the most extreme Berkeleian idealist might argue against the former, but the latter is not nearly so obvious.

A network with a security vulnerability is insecure to those who know about the vulnerability.If noone knows about itâ€â€Âif it is literally a vulnerability that has not been discoveredâ€â€Âthen the network is secure. If one person knows about it, then the network is insecure to him but secure to everyone else. If the network equipment manufacturer knows about it…if security researchers know about it…if the hacking community knows about it the insecurity of the network increasesas news of the vulnerability gets out.

Or does it? The vulnerability exists, whether or not anyone knows about it.Publishing a vulnerability does not cause the network to be insecure. To claim that would be confusing knowledge about a thing with the thing itself. Publishing increases the likelihood that an attacker will use the vulnerability, but not the severity of the vulnerability. Publishing also increases the likelihood that people can defend against the vulnerability. Just as an attacker can’t exploit a vulnerability he does not know about, a defender can’t protect against a vulnerability he does not know about.

So if keeping vulnerabilities secret increases security, it does so in a fragile way. Keeping vulnerabilities secret only works as long as they remain secretâ€â€Âbut everything about information works toward spreading information. Some people spread secrets accidentally; others spread them on purpose. Sometimes secrets are re-derived by someone else. And once a secret is out, it can never be put back.

TABLE OF CONTENT:
Chapter 01 - Footprinting
Chapter 02 - Scanning
Chapter 03 - Enumeration
Chapter 04 - Hacking Windows 95/98 and ME
Chapter 05 - Hacking Windows NT
Chapter 06 - Hacking Windows 2000
Chapter 07 - Novell NetWare Hacking
Chapter 08 - Hacking UNIX
Chapter 09 - Dial-Up, PBX, Voicemail, and VPN Hacking
Chapter 10 - Network Devices
Chapter 11 - Firewalls
Chapter 12 - Denial of Service (DoS) Attacks
Chapter 13 - Remote Control Insecurities
Chapter 14 - Advanced Techniques
Chapter 15 - Web Hacking
Chapter 16 - Hacking the Internet User
Appendix A - Ports
Appendix B - Top 14 Security Vulnerabilities
Appendix C - About the Companion Web Site

Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks
using the tactical security information contained in this comprehensive
volume. Hacking Exposed Wireless reveals how hackers zero in on
susceptible networks and peripherals, gain access, and execute
debilitating attacks. Find out how to plug security holes in
Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to
launch wireless exploits from Metasploit, employ bulletproof
authentication and encryption, and sidestep insecure wireless hotspots.
The book includes vital details on new, previously unpublished attacks
alongside real-world countermeasures.
- Understand the concepts behind RF electronics, Wi-Fi/802.11, and
Bluetooth
- Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and
AiroPeek to target vulnerable wireless networks
- Defend against WEP key brute-force, aircrack, and traffic injection
hacks
- Crack WEP at new speeds using Field Programmable Gate Arrays or your
spare PS3 CPU cycles
- Prevent rogue AP and certificate authentication attacks
- Perform packet injection from Linux
- Launch DoS attacks using device driver-independent tools
- Exploit wireless device drivers using the Metasploit 3.0 Framework
- Identify and avoid malicious hotspots
- Deploy WPA/802.11i authentication and encryption using PEAP,
FreeRADIUS, and WPA pre-shared keys

http://rapidshare.com/files/60717029/Hack_Attacks_Revealed.rar

0 comments:

 
Disclaimer:
This site does not store any files on its server.We only index and link to content provided by other sites and also if you feel any copyrighted material is seen in this blog ..
please feel to write us.. gnbcreation@yahoo.com