第 1/3 張圖片



圖片庫
第 1/3 張圖片



有類似物品要出售?
HACK ATTACKS DENIED
US $15.00
大約HK$ 116.55
狀況:
“Very Good Condition, Little signs of use with CD-Rom included.”
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
見面交收或取貨:
可於Mechanic Falls, Maine, 美國免費本地見面交收. 
運送:
US $15.24(大約 HK$ 118.41) UPS Ground. 
所在地:Mechanic Falls, Maine, 美國
送達日期:
估計於 11月4日 (星期二)至 11月10日 (星期一)之間送達 運送地點 94104
退貨:
不可退貨. 
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
 eBay 物品編號:394103415256
 物品細節
- 物品狀況
- 很好
- 賣家備註
- “Very Good Condition, Little signs of use with CD-Rom included.”
- Country/Region of Manufacture
- United States
- Custom Bundle
- No
- Subject Area
- Network Security, Information Management
- Educational Level
- Adult & Further Education, High School, Vocational School
- Features
- 1st Edition
- Subject
- Computer Science, Education, Engineering & Technology, Ethics, Networks
- Personalized
- No
- Level
- Intermediate, Advanced, Technical
- ISBN
- 9780471416258
關於產品
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471416258
ISBN-13
9780471416258
eBay Product ID (ePID)
1824615
Product Key Features
Number of Pages
512 Pages
Language
English
Publication Name
Hack Attacks Denied : a Complete Guide to Network Lockdown
Publication Year
2001
Subject
Networking / General, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.1 in
Item Weight
31.6 Oz
Item Length
9.3 in
Item Width
7.6 in
Additional Product Features
Intended Audience
Trade
LCCN
2001-017829
Dewey Edition
21
Reviews
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!" (Kelly M. Larsen , C2Protect, DoD Security Instructor) "Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems." (L. Peterson, AFCERT) "[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review) "Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Acknowledgments. A Note to the Reader. Introduction. SECURING PORTS AND SERVICES. Common Ports and Services. Concealed Ports and Services. Discovery Countermeasures. Intuitive Intermission: The Other Side. INTRUSION DEFENSE MECHANISMS. Safeguarding Against Penetration Attacks. TIGER TEAM SECRETS. Locking Down Perimeter Hardware and Server Daemons. PUTTING IT ALL TOGETHER. Intuitive Intermission: Final Act: Rebirth. Security Policies. Appendix A: SafetyWare. Appendix B: Template for Security Plan. Appendix C: What's on the CD. Glossary. References. Index.
Synopsis
Learn how to beat hackers at their own game Hack Attacks Denied If you've read John Chirillo's provocative work,Hack Attacks Revealed, you're well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box? tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security stepsA-from system to daemonA-and helps you tie the information together to create a highly effective security policy. Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains: Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures How to detect and protect against intrusionA-from backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls, Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more., In the second of this two-volume set on what has become the #1 menace for organizations worldwide-network security breaches-corporate hack master John Chirillo offers detailed explanations of how to harden all parts of the network against all security breaches described in Hack Attacks Revealed.
LC Classification Number
QA76.9.A25C47 2001
賣家提供的物品說明
賣家信用評價 (8)
- *****- 買家留下的信用評價。超過 1 年前購買已獲認證Great price ,and the item arrived well packaged and early. Highly recommended seller. Thanks
- *****- 買家留下的信用評價。超過 1 年前購買已獲認證Shipped fast, well packaged, recommended seller!!
- *****- 買家留下的信用評價。超過 1 年前購買已獲認證As advertised, good price, quick shipping, recommended.
這是不公開的刊登,除了賣家之外,其他人無法得知你的身份。