Table of Contents:
I Setting the Stage
Chapter 1 - Why Did I Write This Book?
Chapter 2 - How This Book Will Help You
Chapter 3 - Hackers and Crackers
Chapter 4 - Just Who Can Be Hacked, Anyway?
II Understanding the Terrain
Chapter 5 - Is Security a Futile Endeavor?
Chapter 6 - A Brief Primer on TCP/IP
Chapter 7 - Birth of a Network: The Internet
III Tools
Chapter 10 - Password Crackers
Chapter 13 - Techniques to Hide One's Identity
Chapter 14 - Destructive Devices
IV Platforms and Security
Chapter 17 - UNIX: The Big Kahuna
Chapter 21 - Plan 9 from Bell Labs
V Beginning at Ground Zero
Chapter 22 - Who or What Is Root?
Chapter 23 - An Introduction to Breaching a Server Internally
Chapter 24 - Security Concepts
VI The Remote Attack
Chapter 25 - The Remote Attack
Chapter 29 - Telnet-Based Attacks
Chapter 30 - Language, Extensions, and Security
VII The Law
Chapter 31 - Reality Bytes: Computer Security and the Law
VIII Appendixes
Appendix A - How to Get More Information
Appendix B - Security Consultants
Appendix C - A Hidden Message About the Internet
Appendix D - What's on the CD-ROM
Dedication
This book is dedicated to Michelle, whose presence has rendered me a prince among men.
Acknowledgments
My acknowledgments are brief. First, I would like to acknowledge the folks at Sams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible mess. They are an awesome editing team and their expertise is truly extraordinary.
Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and Stacie Latreille. These individuals offered critical support, without which this book could not have been written.
Also, I would like to recognize the significant contribution made by John David Sale, a network security specialist located in
Tell Us What You Think!
As a reader, you are the most important critic and commentator of our books. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. You can help us make strong books that meet your needs and give you the computer guidance you require.
Do you have access to the World Wide Web? Then check out our site at http://www.mcp.com.
ليست هناك تعليقات:
إرسال تعليق