Text
The hacker's handbook: the strategy behind breaking into and defending networks
Table of contents:
1. Introduction: The Chess Game
Pt. I. Foundation Material
2. Case Study in Subversion
3. Know Your Opponent
4. Anatomy of an Attack
5. Your Defensive Arsenal
6. Programming
7. IP and Layer 2 Protocols
8. The Protocols
Pt. II. System and Network Penetration
9. Domain Name System (DNS)
10. Directory Services
11. Simple Mail Transfer Protocol (SMTP)
12. Hypertext Transfer Protocol (HTTP)
13. Database Hacking and Security
14. Malware and Viruses
15. Network Hardware
Pt. III. Consolidation
16. Consolidating Gains
17. After the Fall
18. Conclusion.
No other version available