v

您的位置:VeryCD图书计算机与网络

图书资源事务区


《黑客大曝光:网络安全机密与解决方案(第7版)》(Hacking Exposed 7 Network Security Secre)第7版[PDF]

  • 状态: 精华资源
  • 摘要:
    图书分类网络
    出版社Stuart McClure
    发行时间2012年
    语言英文
  • 时间: 2013/02/20 16:53:32 发布 | 2013/03/07 09:50:05 更新
  • 分类: 图书  计算机与网络 

lovelinux8

精华资源: 42

全部资源: 43

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名黑客大曝光:网络安全机密与解决方案(第7版)
原名Hacking Exposed 7 Network Security Secre
图书分类网络
资源格式PDF
版本第7版
出版社Stuart McClure
书号0071780289
发行时间2012年
地区美国
语言英文
简介

IPB Image

内容介绍:

This is the latest tactics for thwarting digital attacks. "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." (Brett Wahlin, CSO, Sony Network Entertainment). "Stop taking punches - let's change the game; it's time for a paradigm shift in the way we secure our networks, and "Hacking Exposed 7" is the playbook for bringing pain to our adversaries." (Shawn Henry, former Executive Assistant Director, FBI). Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. "Hacking Exposed 7: Network Security Secrets and Solutions" contains all-new visual maps and a comprehensive "countermeasures cookbook." It features: obstruct APTs and web-based meta-exploits; defend against UNIX-based root access and buffer overflow hacks; block SQL injection, spear phishing, and embedded-code attacks; detect and terminate rootkits, Trojans, bots, worms, and malware; lock down remote access; using smartcards and hardware tokens; protect 802.11 WLANs with multilayered encryption and gateways; plug holes in VoIP, social networking, cloud, and Web 2.0 services; and learn about the latest iPhone and Android attacks and how to protect yourself.

内容截图:

IPB Image

Hacking Exposed 7 Network Security Secre - Stuart McClure.pdf
http://www.ctdisk.com/shared/folder_2285676_a8a7fcc2/


决战恶意代码_11364020.pdf
恶意代码取证_12333620_北京市:科学出版社_2009.08_詹姆斯M·奎林娜著.TextMark.pdf
恶意传播代码Windows病毒防护_11348393_北京市:机械工业出版社_2004.06_(美)Roger A.Grimes著;张志斌,贾旺盛等译.TextMark.pdf
黑客攻防演习 第二版_11844954_北京市:电子工业出版社_2007.06_(美)思克迪斯(Skoudis,E.)著;龚玲等译.TextMark.pdf

J2EE&Java黑客大曝光:开发安全的Java应用程序_11156938.pdf



目录

1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有129网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。