Sinopsis
In many ways, this is almost the hardest chapter to pen in this book; in writing this, I am forced to relive the many occasions on which I have stood in a bookstore leafing through a technical book, trying to determine its value to the technical “excursion” I am currently embarked on. I generally start with the preface … (sigh). For this particular book, putting together an accurate, representative preface is a daunting task; The Hacker’s Handbook was deliberately constructed as a multifaceted text. Let me try — this book is about hacking, yes, but it is also weighted towards the security community. At the time when the authors started framing the book (May 2001), a significant number of books on the subject of digital hacking and security had already been published. In an effort to make some “space” for this book, we reviewed many of them and came to the conclusion that there was room for a book that adopted an analytical perspective on hacking and security and attempted to inform readers about the technical aspects of hacking that are, perhaps, least understood by system, network, and security administrators.
Content
- Introduction: The Chess Game
- Case Study in Subversion
- Know Your Opponent
- Anatomy of an Attack
- Your Defensive Arsenal
- Programming
- IP and Layer 2 Protocols
- The Protocols
- Domain Name System (DNS)
- Directory Services
- Simple Mail Transfer Protocol (SMTP)
- Hypertext Transfer Protocol (HTTP)
- Database Hacking and Security
- Malware and Viruses
- Network Hardware
- Consolidating Gains
- After the Fall
- Conclusion
0 komentar:
Posting Komentar