- ホーム
- > 洋書
- > 英文書
- > Computer / Integrated System
Full Description
Safeguard your systems from all types of hackers, hijackers, and predators with help from this insightful resource. Get thorough, just-the-facts coverage of Linux, UNIX and Solaris, and learn about advanced hacking techniques including buffer overflows, password theory, port re-direction, and more.
Contents
Part IIdentification 3: Enumeration 4: Remote Hacking 5: Privilege Escalation 6: Hiding Part II: Host Hardening 7: Default Settings and Services 8: User and File-System Privileges 9: Logging and Patching Part III: Special Topics 10: Nessus Attack Scripting Language (NASL) 11: Wireless Hacking 12: Hacking with the Sharp Zaurus PDANER(01): WOW