الخميس، 12 نوفمبر 2009

جديد x جديد ليوم 12-11-2009

كتاب رائع للمهتمين بعلوم الكومبيوتر
ثروة علمية فالكتاب مرتبط بموقع هام فى هذا التخصص
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

Table of Contents:

Introduction

I Setting the Stage

Chapter 1 - Why Did I Write This Book?

Chapter 2 - How This Book Will Help You

Chapter 3 - Hackers and Crackers

Chapter 4 - Just Who Can Be Hacked, Anyway?

II Understanding the Terrain

Chapter 5 - Is Security a Futile Endeavor?

Chapter 6 - A Brief Primer on TCP/IP

Chapter 7 - Birth of a Network: The Internet

Chapter 8 - Internet Warfare

III Tools

Chapter 9 - Scanners

Chapter 10 - Password Crackers

Chapter 11 - Trojans

Chapter 12 - Sniffers

Chapter 13 - Techniques to Hide One's Identity

Chapter 14 - Destructive Devices

IV Platforms and Security

Chapter 15 - The Hole

Chapter 16 - Microsoft

Chapter 17 - UNIX: The Big Kahuna

Chapter 18 - Novell

Chapter 19 - VAX/VMS

Chapter 20 - Macintosh

Chapter 21 - Plan 9 from Bell Labs

V Beginning at Ground Zero

Chapter 22 - Who or What Is Root?

Chapter 23 - An Introduction to Breaching a Server Internally

Chapter 24 - Security Concepts

VI The Remote Attack

Chapter 25 - The Remote Attack

Chapter 26 - Levels of Attack

Chapter 27 - Firewalls

Chapter 28 - Spoofing Attacks

Chapter 29 - Telnet-Based Attacks

Chapter 30 - Language, Extensions, and Security

VII The Law

Chapter 31 - Reality Bytes: Computer Security and the Law

VIII Appendixes

Appendix A - How to Get More Information

Appendix B - Security Consultants

Appendix C - A Hidden Message About the Internet

Appendix D - What's on the CD-ROM

Dedication

This book is dedicated to Michelle, whose presence has rendered me a prince among men.

Acknowledgments

My acknowledgments are brief. First, I would like to acknowledge the folks at Sams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible mess. They are an awesome editing team and their expertise is truly extraordinary.

Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and Stacie Latreille. These individuals offered critical support, without which this book could not have been written.

Also, I would like to recognize the significant contribution made by John David Sale, a network security specialist located in Van Nuys, California. His input was invaluable. A similar thanks is also extended to Peter Benson, an Internet and EDI Consultant in Santa Monica, California (who, incidentally, is the current chairman of ASC X12E). Peter's patience was (and is) difficult to fathom. Moreover, I forward a special acknowledgment to David Pennells and his merry band of programmers. Those cats run the most robust and reliable wire in the southwestern United States.

Tell Us What You Think!

As a reader, you are the most important critic and commentator of our books. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. You can help us make strong books that meet your needs and give you the computer guidance you require.

Do you have access to the World Wide Web? Then check out our site at http://www.mcp.com.

حمله من الرابطالتالى

ليست هناك تعليقات: