HACK ATTACKS DENIED

US $15.00
大約HK$ 116.55
狀況:
很好
Very Good Condition, Little signs of use with CD-Rom included.
見面交收或取貨:
可於Mechanic Falls, Maine, 美國免費本地見面交收.
運送:
US $15.24(大約 HK$ 118.41) UPS Ground.
所在地:Mechanic Falls, Maine, 美國
送達日期:
估計於 11月4日 (星期二)11月10日 (星期一)之間送達 運送地點 94104
估計運送時間是透過我們的獨家工具,根據買家與物品所在地的距離、所選的運送服務、賣家的運送紀錄及其他因素,計算大概的時間。送達時間會因時而異,尤其是節日。
退貨:
不可退貨.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:394103415256

物品細節

物品狀況
很好
曾被閱讀過的書籍,但狀況良好。封面不存在明顯損壞,精裝本書籍含書皮。不存在缺頁或內頁受損,無褶皺或破損,同時也沒有對文字標注/標記,或在留白處書寫內容。內封面上標記可能極少。書籍的磨損和破損程度也很低。 查看所有物品狀況定義會在新視窗或分頁中開啟
賣家備註
“Very Good Condition, Little signs of use with CD-Rom included.”
Country/Region of Manufacture
United States
Custom Bundle
No
Subject Area
Network Security, Information Management
Educational Level
Adult & Further Education, High School, Vocational School
Features
1st Edition
Subject
Computer Science, Education, Engineering & Technology, Ethics, Networks
Personalized
No
Level
Intermediate, Advanced, Technical
ISBN
9780471416258
類別

關於產品

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471416258
ISBN-13
9780471416258
eBay Product ID (ePID)
1824615

Product Key Features

Number of Pages
512 Pages
Language
English
Publication Name
Hack Attacks Denied : a Complete Guide to Network Lockdown
Publication Year
2001
Subject
Networking / General, Security / Networking
Type
Textbook
Subject Area
Computers
Author
John Chirillo
Format
Trade Paperback

Dimensions

Item Height
1.1 in
Item Weight
31.6 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Intended Audience
Trade
LCCN
2001-017829
Dewey Edition
21
Reviews
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!" (Kelly M. Larsen , C2Protect, DoD Security Instructor) "Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems." (L. Peterson, AFCERT) "[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review) "Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Acknowledgments. A Note to the Reader. Introduction. SECURING PORTS AND SERVICES. Common Ports and Services. Concealed Ports and Services. Discovery Countermeasures. Intuitive Intermission: The Other Side. INTRUSION DEFENSE MECHANISMS. Safeguarding Against Penetration Attacks. TIGER TEAM SECRETS. Locking Down Perimeter Hardware and Server Daemons. PUTTING IT ALL TOGETHER. Intuitive Intermission: Final Act: Rebirth. Security Policies. Appendix A: SafetyWare. Appendix B: Template for Security Plan. Appendix C: What's on the CD. Glossary. References. Index.
Synopsis
Learn how to beat hackers at their own game Hack Attacks Denied If you've read John Chirillo's provocative work,Hack Attacks Revealed, you're well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box? tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security stepsA-from system to daemonA-and helps you tie the information together to create a highly effective security policy. Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains: Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures How to detect and protect against intrusionA-from backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls, Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more., In the second of this two-volume set on what has become the #1 menace for organizations worldwide-network security breaches-corporate hack master John Chirillo offers detailed explanations of how to harden all parts of the network against all security breaches described in Hack Attacks Revealed.
LC Classification Number
QA76.9.A25C47 2001

賣家提供的物品說明

賣家簡介

josepperreaul0

100% 正面信用評價已賣出 19 件物品

加入日期:3月 2016

賣家信用評價 (8)

全部評級selected
正面
中立
負面
  • *****- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    Great price ,and the item arrived well packaged and early. Highly recommended seller. Thanks
  • *****- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    Shipped fast, well packaged, recommended seller!!
  • *****- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    As advertised, good price, quick shipping, recommended.
這是不公開的刊登,除了賣家之外,其他人無法得知你的身份。