skip to content
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses Preview this item
ClosePreview this item
Checking...

Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

Author: Ed Skoudis; Tom Liston
Publisher: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006.
Series: Radia Perlman series in computer networking and security.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Summary:

Intended for network/system administrators and security professionals, this work covers everything from the basic principles to the details of online attack methods and counter. It walks you through  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Skoudis, Ed.
Counter hack reloaded.
Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006
(OCoLC)636337105
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Ed Skoudis; Tom Liston
ISBN: 0131481045 9780131481046
OCLC Number: 61694770
Notes: Revised edition of: Counter hack, c2002.
Description: xxxii, 748 pages : illustrations ; 24 cm.
Contents: Ch. 1. Introduction --
Ch. 2. Networking overview : pretty much everything you need to know about networking to follow the rest of this book --
Ch. 3. Linux and UNIX overview : pretty much everything you need to know about Linux and UNIX to follow the rest of this book --
Ch. 4. Windows NT/2000/XP/2003 overview : pretty much everything you need to know about Windows to follow the rest of this book --
Ch. 5. Phase 1 : reconnaissance --
Ch. 6. Phase 2 : scanning --
Ch. 7. Phase 3 : gaining access using application and operating system attacks --
Ch. 8. Phase 3 : gaining access using network attacks --
Ch. 9. Phase 3 : denial-of-service attacks --
Ch. 10. Phase 4 : maintaining access : Trojans, backdoors, and rootkits ... oh my! --
Ch. 11. Phase 5 : covering tracks and hiding --
Ch. 12. Putting it all together : anatomy of an attack --
Ch. 13. The future, references, and conclusions.
Series Title: Radia Perlman series in computer networking and security.
Responsibility: Ed Skoudis with Tom Liston.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(4)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/61694770> # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "61694770" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/864878133#Place/upper_saddle_river_nj> ; # Upper Saddle River, NJ
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   rdfs:seeAlso <http://experiment.worldcat.org/entity/work/data/864878133#CreativeWork/counter_hack> ; # Counter hack.
   schema:about <http://experiment.worldcat.org/entity/work/data/864878133#Topic/it_sakerhet> ; # IT-säkerhet
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/864878133#Topic/datanat> ; # Datanät
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:bookEdition "2nd ed." ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/161922218> ; # Tom Liston
   schema:contributor <http://viaf.org/viaf/46418536> ; # Ed Skoudis
   schema:copyrightYear "2006" ;
   schema:creator <http://viaf.org/viaf/46418536> ; # Ed Skoudis
   schema:datePublished "2006" ;
   schema:description "Ch. 1. Introduction -- Ch. 2. Networking overview : pretty much everything you need to know about networking to follow the rest of this book -- Ch. 3. Linux and UNIX overview : pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Ch. 4. Windows NT/2000/XP/2003 overview : pretty much everything you need to know about Windows to follow the rest of this book -- Ch. 5. Phase 1 : reconnaissance -- Ch. 6. Phase 2 : scanning -- Ch. 7. Phase 3 : gaining access using application and operating system attacks -- Ch. 8. Phase 3 : gaining access using network attacks -- Ch. 9. Phase 3 : denial-of-service attacks -- Ch. 10. Phase 4 : maintaining access : Trojans, backdoors, and rootkits ... oh my! -- Ch. 11. Phase 5 : covering tracks and hiding -- Ch. 12. Putting it all together : anatomy of an attack -- Ch. 13. The future, references, and conclusions."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/864878133> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/864878133#Series/radia_perlman_series_in_computer_networking_and_security> ; # Radia Perlman series in computer networking and security.
   schema:isSimilarTo <http://www.worldcat.org/oclc/636337105> ;
   schema:name "Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses"@en ;
   schema:productID "61694770" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/61694770#PublicationEvent/upper_saddle_river_nj_prentice_hall_professional_technical_reference_2006> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/864878133#Agent/prentice_hall_professional_technical_reference> ; # Prentice Hall Professional Technical Reference
   schema:url <http://catdir.loc.gov/catdir/toc/ecip0519/2005027164.html> ;
   schema:workExample <http://worldcat.org/isbn/9780131481046> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA572845> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/61694770> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/864878133#Agent/prentice_hall_professional_technical_reference> # Prentice Hall Professional Technical Reference
    a bgn:Agent ;
   schema:name "Prentice Hall Professional Technical Reference" ;
    .

<http://experiment.worldcat.org/entity/work/data/864878133#Place/upper_saddle_river_nj> # Upper Saddle River, NJ
    a schema:Place ;
   schema:name "Upper Saddle River, NJ" ;
    .

<http://experiment.worldcat.org/entity/work/data/864878133#Series/radia_perlman_series_in_computer_networking_and_security> # Radia Perlman series in computer networking and security.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/61694770> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
   schema:name "Radia Perlman series in computer networking and security." ;
   schema:name "Radia Perlman series in computer networking and security" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/161922218> # Tom Liston
    a schema:Person ;
   schema:familyName "Liston" ;
   schema:givenName "Tom" ;
   schema:name "Tom Liston" ;
    .

<http://viaf.org/viaf/46418536> # Ed Skoudis
    a schema:Person ;
   schema:familyName "Skoudis" ;
   schema:givenName "Ed" ;
   schema:name "Ed Skoudis" ;
    .

<http://worldcat.org/isbn/9780131481046>
    a schema:ProductModel ;
   schema:isbn "0131481045" ;
   schema:isbn "9780131481046" ;
    .

<http://www.worldcat.org/oclc/636337105>
    a schema:CreativeWork ;
   rdfs:label "Counter hack reloaded." ;
   schema:description "Online version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/61694770> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
    .

<http://www.worldcat.org/title/-/oclc/61694770>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/61694770> ; # Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
   schema:dateModified "2018-03-12" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.