♥FUNREALITY FORUM♥
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Practical Hacking Techniques and Countermeasures

Go down

Practical Hacking Techniques and Countermeasures Empty Practical Hacking Techniques and Countermeasures

Post by knight_panther Wed May 21, 2008 7:52 am

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures 10x9640

# Provides detailed examples of attacks on Windows and Linux
# Contains numerous screenshots for easily verified results
# Details Linux script compilation and use
# Lists the complete syntax for tools used throughout the book



Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

Written in a lab manual style, the book begins with the installation of the VMwareŽ Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.

Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures

By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

# 752 pages PDF Format
# Publisher: AUERBACH; Har/Cdr edition (November 2, 2006)
# Language: English
# ISBN-10: 0849370574
# ISBN-13: 978-0849370571



Code:
http://rapidshare.com/files/116291805/b-559b01.zip
knight_panther
knight_panther
Moderator
Moderator

Number of posts : 588
Age : 34
Location : Lost iN DarK Side
Registration date : 2008-05-07

Back to top Go down

Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum