Hack Proofing Your Network
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress
The book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine Recon, Research/Develop, Execute Attack and Achieve Goal, and Cleanup.
Ссылка удалена правообладателем
----
The book removed at the request of the copyright holder.