Книга "Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit" рассказывает о сетевых хакерских атаках, которые являются наиболее серьезной угрозой для компьютерных систем по всему миру. Автор Джон Чирелло знает, как предотвратить эти атаки, и в этой книге он делится своим опытом, полученным в ходе проверки политики безопасности и проведения аудитов безопасности в крупных компаниях, включая Fortune 1000. Он рассматривает все аспекты мира хакеров, включая то, как они используют уязвимости в частных и общественных сетях, а также как работают инструменты для сетевого

Hack Attacks Revealed is a complete reference with a custom security hacking toolkit, authored by John Chirillo. This hands-on book examines a significant harassment of computer systems worldwide; network hacking, which may lead to mysterious server crashes and data loss. Chirolo shows how to prevent these worrying issues, including breaking into Fortune 1,00 company networks to assess security and evaluate its policy. The book dives deep into every aspect of hackers' world and shows how they exploit vulnerabilities in private, as well as public, networks, and covers how hacking tools function.

Электронная Книга «Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit» написана автором John Chirillo в году.

Минимальный возраст читателя: 0

Язык: Английский

ISBN: 9780471189923


Описание книги от John Chirillo

The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.



Похожие книги

Информация о книге