It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 13879cam 2201045Ia 4500
001 ocm51564102
003 OCoLC
005 20200113174144.0
008 030203s2002 enka o 001 0 eng d
006 m o d
007 cr cn|||||||||
040 $aN$T$beng$epn$cN$T$dOCLCQ$dOCLCG$dOCLCQ$dTUU$dOCLCQ$dTNF$dZCU$dB24X7$dOPELS$dMERUC$dCCO$dE7B$dVVN$dEBLCP$dREDDC$dBAKER$dDKDLA$dNNM$dFVL$dOCLCQ$dOCLCO$dOCLCF$dUMI$dOCLCQ$dDEBBG$dNLGGC$dOCLCQ$dDEBSZ$dYDXCP$dAU@$dOCLCQ$dCOO$dAZK$dAGLDB$dMOR$dPIFBR$dOCLCQ$dWY@$dOCLCA$dROC$dMNS$dRCC$dSTF$dBRL$dWRM$dD6H$dOCLCQ$dVTS$dCEF$dNRAMU$dICG$dOCLCQ$dVT2$dTOF$dOCLCQ$dUWO$dG3B$dC6I$dOCLCQ$dUAB$dLEAUB$dUKMGB$dOCLCQ$dK6U$dZGM
015 $aGBA1U5485$2bnb
015 $aGBB975135$2bnb
016 7 $a017581707$2Uk
016 7 $a1928994709$2Uk
019 $a50121224$a50689170$a56673426$a70751032$a162598479$a474435490$a507200984$a559510895$a646706628$a722109244$a728006367$a856952195$a878966386$a961580799$a961636079$a962678798$a962719975$a988406439$a991907190$a991953102$a1020544404$a1035648793$a1037484661$a1038569659$a1045575702$a1055347297$a1057260213$a1060197681$a1066966130$a1081255880$a1103256360$a1129143821
020 $a1932266186$q(electronic bk.)
020 $a9781932266184$q(electronic bk.)
020 $a9781928994701
020 $a1928994709
020 $a9780080478166
020 $a0080478166
035 $a(OCoLC)51564102$z(OCoLC)50121224$z(OCoLC)50689170$z(OCoLC)56673426$z(OCoLC)70751032$z(OCoLC)162598479$z(OCoLC)474435490$z(OCoLC)507200984$z(OCoLC)559510895$z(OCoLC)646706628$z(OCoLC)722109244$z(OCoLC)728006367$z(OCoLC)856952195$z(OCoLC)878966386$z(OCoLC)961580799$z(OCoLC)961636079$z(OCoLC)962678798$z(OCoLC)962719975$z(OCoLC)988406439$z(OCoLC)991907190$z(OCoLC)991953102$z(OCoLC)1020544404$z(OCoLC)1035648793$z(OCoLC)1037484661$z(OCoLC)1038569659$z(OCoLC)1045575702$z(OCoLC)1055347297$z(OCoLC)1057260213$z(OCoLC)1060197681$z(OCoLC)1066966130$z(OCoLC)1081255880$z(OCoLC)1103256360$z(OCoLC)1129143821
037 $a101100:101134$bElsevier Science & Technology$nhttp://www.sciencedirect.com
050 4 $aTK5105.59$b.H33 2002eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$221
245 00 $aHack proofing your network /$cDavid R. Mirza Ahmad [and others] ; Ryan Russell, technical editor.
250 $a2nd ed.
260 $aRockland, MA :$bSyngress,$c℗♭2002.
300 $a1 online resource (xxxiv, 787 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file$2rda
500 $aIncludes index.
520 $aA new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com.
588 0 $aPrint version record.
505 0 $aForeword v 1.5</br><br>Foreword v 1.0</br><br>Chapter 1 How To Hack</br><br> Introduction</br><br> What We Mean by "Hack#x94;</br><br> Why Hack?</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?</br><br> Why Diff?</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?</br><br> How Can They Be Fixed?</br><br> How Format String Vulnerabilities Are Exploited</br><br> How Format String Exploits Work</br><br> What to Overwrite</br><br> Examining a Vulnerable Program</br><br> Testing with a Random Format String</br><br> Writing a Format String Exploit</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 10 Sniffing</br><br> Introduction</br><br> What Is Sniffing?</br><br> How Does It Work?</br><br> What to Sniff?</br><br> Obtaining Authentication Information</br><br> Capturing Other Network Traffic</br><br> Popular Sniffing Software</br><br> Ethereal</br><b
504 $aIncludes index.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
655 0 $aElectronic books.
655 4 $aElectronic books.
700 1 $aAhmad, David R. Mirza.
700 1 $aRussell, Ryan,$d1969-
776 08 $iPrint version:$tHack proofing your network.$b2nd ed.$dRockland, MA : Syngress, ℗♭2002$z1928994709$w(OCoLC)48468640
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?isbn=1928994709
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?bookid=3266
856 40 $3ebrary$uhttp://site.ebrary.com/id/10007039
856 40 $3EBSCOhost$uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75905
856 40 $3ProQuest Ebook Central$uhttps://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=294158
856 40 $3Referex$uhttp://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994701$zAn electronic book accessible through the World Wide Web; click for information
856 40 $3Safari Books Online$uhttps://proquest.safaribooksonline.com/9781928994701
856 40 $3Safari Books Online$uhttps://www.safaribooksonline.com/library/view//9781928994701/?ar
856 40 $3Safari Books Online$uhttps://www.safaribooksonline.com/library/view/title/9781928994701/?ar?orpq&email=^u
856 40 $3ScienceDirect$uhttps://www.sciencedirect.com/science/book/9781928994701
856 4 $3Available from Skillsoft Books ITPro$idbcode=AALIM; providercode=PRVAEB$uhttps://cornell-library.skillport.com/skillportfe/main.action?assetid=3266
856 4 $3Volltext$uhttp://proquest.tech.safaribooksonline.de/9781928994701$xVerlag
856 4 $uhttp://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=75905$zAvailable to CUNY Graduate Center users.$xproxy
938 $aBooks 24x7$bB247$nbks00001981
938 $aBaker & Taylor$bBKTY$c49.95$d37.46$i1928994709$n0003774500$sactive
938 $aProQuest Ebook Central$bEBLB$nEBL139972
938 $aebrary$bEBRY$nebr10007039
938 $aEBSCOhost$bEBSC$n75905
938 $aYBP Library Services$bYANK$n2361853
029 1 $aAU@$b000050963028
029 1 $aAU@$b000051557268
029 1 $aAU@$b000051860155
029 1 $aAU@$b000053222239
029 1 $aCHNEW$b001004523
029 1 $aDEBBG$bBV042032130
029 1 $aDEBBG$bBV042307311
029 1 $aDEBBG$bBV043087840
029 1 $aDEBSZ$b405313861
029 1 $aDEBSZ$b414175972
029 1 $aDEBSZ$b422447099
029 1 $aNZ1$b12435671
029 1 $aNZ1$b15177203
029 1 $aUKMGB$b017581707
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 1770 OTHER HOLDINGS