A Hacker's Guide to Protecting Your Internet Site and Network
The author describes himself as a "UNIX propeller head" and is a dedicated advocate of
the Perl programming language, Linux, and FreeBSD.
Table of Contents:
I Setting the Stage:
• Chapter 1 - Why Did I Write This Book?
• Chapter 2 - How This Book Will Help You
• Chapter 3 - Hackers and Crackers
• Chapter 4 - Just Who Can Be Hacked, Anyway?
II Understanding the Terrain:
• Chapter 5 - Is Security a Futile Endeavor?
• Chapter 6 - A Brief Primer on TCP/IP
• Chapter 7 - Birth of a Network: The Internet
• Chapter 8 - Internet Warfare
III Tools:
• Chapter 9 - Scanners
• Chapter 10 - Password Crackers
• Chapter 11 - Trojans
• Chapter 12 - Sniffers
• Chapter 13 - Techniques to Hide One's Identity
• Chapter 14 - Destructive Devices
IV Platforms and Security:
• Chapter 15 - The Hole
• Chapter 16 - Microsoft
• Chapter 17 - UNIX: The Big Kahuna
• Chapter 18 - Novell
• Chapter 19 - VAX/VMS
• Chapter 20 - Macintosh
• Chapter 21 - Plan 9 from Bell Labs
V Beginning at Ground Zero:
• Chapter 22 - Who or What Is Root?
• Chapter 23 - An Introduction to Breaching a Server Internally
• Chapter 24 - Security Concepts
VI The Remote Attack:
• Chapter 25 - The Remote Attack
• Chapter 26 - Levels of Attack
• Chapter 27 - Firewalls
• Chapter 28 - Spoofing Attacks
• Chapter 29 - Telnet-Based Attacks
• Chapter 30 - Language, Extensions, and Security
VII The Law:
• Chapter 31 - Reality Bytes: Computer Security and the Law
VIII Appendixes:
• Appendix A - How to Get More Information
• Appendix B - Security Consultants
• Appendix C - A Hidden Message About the Internet
• Appendix D - What's on the CD-ROM
Do you have questions, comments, or suggestions? Feel free to post a comment!
Read These Awesome Related Posts: E-Books
Subscribe to:
Post Comments (Atom)
Share your views...
0 Respones to "A Hacker's Guide to Protecting Your Internet Site and Network"
Post a Comment