Sercurity Hacking – List 3

Security List #3

Web And Information Security
* Publisher: IRM Press
* Number Of Pages: 318
* Publication Date: 2005-10-19
* Sales Rank: 1187066
* ISBN / ASIN: 1591405882
* EAN: 9781591405887
* Binding: Hardcover
* Manufacturer: IRM Press
* Studio: IRM Press

Product Description:

Web and Information Security consists of a collection of chapters written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. Web and Information Security is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.


Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
By John Chirillo

* Publisher: John Wiley & Sons
* Number Of Pages: 800
* Publication Date: 2001-04-05
* Sales Rank: 743446
* ISBN / ASIN: 047141624X
* EAN: 9780471416241
* Binding: Paperback
* Manufacturer: John Wiley & Sons
* Studio: John Wiley & Sons

Book Description:

Beat hackers at their own game — The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed

Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you’ll discover:
• The hacker’s perspective on networking protocols and communication technologies
• A complete hacker’s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
• Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
• Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks


Còn tiếp sẽ cập nhật sau.

Trở về | Tranh sách chính | Xem tiếp


%d bloggers like this: