skip to content
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses Preview this item
ClosePreview this item
Checking...

Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

Author: Ed Skoudis; Tom Liston
Publisher: Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
Series: Radia Perlman series in computer networking and security.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats
Database:WorldCat
Summary:

Intended for network/system administrators and security professionals, this work covers everything from the basic principles to the details of online attack methods and counter. It walks you through  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Print version:
Skoudis, Ed.
Counter hack reloaded.
Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006
(DLC) 2005027164
(OCoLC)61694770
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ed Skoudis; Tom Liston
ISBN: 9780131481046 0131481045
OCLC Number: 123904762
Description: 1 online resource.
Contents: Introduction --
Networking overview: pretty much everything you need to know about networking to follow the rest of this book --
Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book --
Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book --
Phase 1: reconnaissance --
Phase 2: scanning --
Phase 3: gaining access using application and operating system attacks --
Phase 3: gaining access using network attacks --
Phase 3: denial-of-service attacks --
Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! --
Phase 5: covering tracks and hiding --
Putting it all together: anatomy of an attack --
The future, references, and conclusions.
Series Title: Radia Perlman series in computer networking and security.
Responsibility: by Ed Skoudis, Tom Liston.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/123904762> # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
   library:oclcnum "123904762" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/864878133#Place/upper_saddle_river_n_j> ; # Upper Saddle River, N.J.
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/864878133#Topic/computer_networks_security_measures> ; # Computer networks / Security measures
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:bookEdition "2nd ed." ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/161922218> ; # Tom Liston
   schema:creator <http://viaf.org/viaf/46418536> ; # Ed Skoudis
   schema:datePublished "2005" ;
   schema:description "Introduction -- Networking overview: pretty much everything you need to know about networking to follow the rest of this book -- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book -- Phase 1: reconnaissance -- Phase 2: scanning -- Phase 3: gaining access using application and operating system attacks -- Phase 3: gaining access using network attacks -- Phase 3: denial-of-service attacks -- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! -- Phase 5: covering tracks and hiding -- Putting it all together: anatomy of an attack -- The future, references, and conclusions."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/864878133> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/864878133#Series/radia_perlman_series_in_computer_networking_and_security> ; # Radia Perlman series in computer networking and security.
   schema:isSimilarTo <http://www.worldcat.org/oclc/61694770> ;
   schema:name "Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses"@en ;
   schema:productID "123904762" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/123904762#PublicationEvent/upper_saddle_river_n_j_prentice_hall_professional_technical_reference_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/864878133#Agent/prentice_hall_professional_technical_reference> ; # Prentice Hall Professional Technical Reference
   schema:url <http://proquest.tech.safaribooksonline.de/9780131481046> ;
   schema:url <http://books.google.com/books?id=nulSAAAAMAAJ> ;
   schema:url <http://proquest.safaribooksonline.com/9780131481046> ;
   schema:workExample <http://worldcat.org/isbn/9780131481046> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/123904762> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/864878133#Agent/prentice_hall_professional_technical_reference> # Prentice Hall Professional Technical Reference
    a bgn:Agent ;
   schema:name "Prentice Hall Professional Technical Reference" ;
    .

<http://experiment.worldcat.org/entity/work/data/864878133#Place/upper_saddle_river_n_j> # Upper Saddle River, N.J.
    a schema:Place ;
   schema:name "Upper Saddle River, N.J." ;
    .

<http://experiment.worldcat.org/entity/work/data/864878133#Series/radia_perlman_series_in_computer_networking_and_security> # Radia Perlman series in computer networking and security.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/123904762> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
   schema:name "Radia Perlman series in computer networking and security." ;
   schema:name "Radia Perlman series in computer networking and security" ;
    .

<http://experiment.worldcat.org/entity/work/data/864878133#Topic/computer_networks_security_measures> # Computer networks / Security measures
    a schema:Intangible ;
   schema:name "Computer networks / Security measures"@en ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/161922218> # Tom Liston
    a schema:Person ;
   schema:familyName "Liston" ;
   schema:givenName "Tom" ;
   schema:name "Tom Liston" ;
    .

<http://viaf.org/viaf/46418536> # Ed Skoudis
    a schema:Person ;
   schema:familyName "Skoudis" ;
   schema:givenName "Ed" ;
   schema:name "Ed Skoudis" ;
    .

<http://worldcat.org/isbn/9780131481046>
    a schema:ProductModel ;
   schema:isbn "0131481045" ;
   schema:isbn "9780131481046" ;
    .

<http://www.worldcat.org/oclc/61694770>
    a schema:CreativeWork ;
   rdfs:label "Counter hack reloaded." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/123904762> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
    .

<http://www.worldcat.org/title/-/oclc/123904762>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/123904762> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
   schema:dateModified "2017-09-02" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.