russell
مدیر بازنشسته
Hacking Exposed, Network Security Secrets & Solutions 6th Edition
Stuart McClure "Hacking Exposed, Network Security Secrets & Solutions 6th Edition"
January 2009 | English | ISBN-13: 978-0-07-161374-3 | 720 Pages | PDF | 7.80 MB
January 2009 | English | ISBN-13: 978-0-07-161374-3 | 720 Pages | PDF | 7.80 MB
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.
New and updated material:
* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
* Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
* The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
* New wireless and RFID security tools, including multilayered encryption and gateways
* All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
* Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
* VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
* Fully updated chapters on hacking the Internet user, web hacking, and securing code
Download LINk : RapidShare Link
New and updated material:
* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
* Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
* The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
* New wireless and RFID security tools, including multilayered encryption and gateways
* All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
* Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
* VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
* Fully updated chapters on hacking the Internet user, web hacking, and securing code
Download LINk : RapidShare Link