Silence on the Wire

A Field Guide to Passive Reconnaissance and Indirect Attacks

Author: Michal Zalewski

Publisher: No Starch Press

ISBN: 1593270461

Category: Computers

Page: 312

View: 8162

DOWNLOAD NOW »

"This book will be riveting reading for security professionals and students, as well as technophiles interested in learning about how computer security fits into the big picture and high-level hackers seeking to broaden their understanding of their craft."--BOOK JACKET.
Release

The Book of PF, 2nd Edition

A No-Nonsense Guide to the OpenBSD Firewall

Author: Peter N. M. Hansteen

Publisher: No Starch Press

ISBN: 159327274X

Category: Computers

Page: 216

View: 5193

DOWNLOAD NOW »

This second edition is an up-to-date, no-nonsense guide to harnessing the power of PF. The author covers NAT (network address translation) and redirection, wireless networking, SPAM fighting, failover provisioning, logging, and more.
Release

Hacking, 2nd Edition

The Art of Exploitation

Author: Jon Erickson

Publisher: No Starch Press

ISBN: 1593271441

Category: Computers

Page: 488

View: 5175

DOWNLOAD NOW »

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic attacks, and shellcode.
Release

Practical Packet Analysis

Using Wireshark to Solve Real-world Network Problems

Author: Chris Sanders

Publisher: No Starch Press

ISBN: 1593271492

Category: Computers

Page: 164

View: 4225

DOWNLOAD NOW »

Provides information on ways to use Wireshark to capture and analyze packets, covering such topics as building customized capture and display filters, graphing traffic patterns, and building statistics and reports.
Release

Cyber Warfare and Cyber Terrorism

Author: Janczewski, Lech,Colarik, Andrew

Publisher: IGI Global

ISBN: 1591409926

Category: Political Science

Page: 564

View: 4569

DOWNLOAD NOW »

"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.
Release