You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks »

Book cover image of The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks by Susan Young

Authors: Susan Young
ISBN-13: 9780849308888, ISBN-10: 0849308887
Format: Paperback
Publisher: CRC Press
Date Published: November 2003
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Susan Young

Book Synopsis

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Table of Contents

1Introduction: The Chess Game1
Pt. IFoundation Material13
2Case Study in Subversion15
3Know Your Opponent31
4Anatomy of an Attack57
5Your Defensive Arsenal103
6Programming189
7IP and Layer 2 Protocols229
8The Protocols271
Pt. IISystem and Network Penetration311
9Domain Name System (DNS)313
10Directory Services351
11Simple Mail Transfer Protocol (SMTP)411
12Hypertext Transfer Protocol (HTTP)463
13Database Hacking and Security503
14Malware and Viruses529
15Network Hardware551
Pt. IIIConsolidation603
16Consolidating Gains605
17After the Fall727
18Conclusion793
Index825

Subjects