关闭

关闭

封号提示

内容

首页 [黑客大曝光(第6版)].Hacking.Exposed.6Th.Ed.pdf

[黑客大曝光(第6版)].Hacking.Exposed.6Th.Ed.pdf

[黑客大曝光(第6版)].Hacking.Exposed.6T…

上传者: 三少 2011-05-06 评分1 评论0 下载26 收藏0 阅读量1016 暂无简介 简介 举报

简介:本文档为《[黑客大曝光(第6版)].Hacking.Exposed.6Th.Edpdf》,可适用于IT/计算机领域,主题内容包含HACKINGEXPOSED:NETWORKSECURITYSECRETSSOLUTIONSThispageintentionallyleftbla符等。

HACKINGEXPOSED:NETWORKSECURITYSECRETSSOLUTIONSThispageintentionallyleftblankHACKINGEXPOSED:NETWORKSECURITYSECRETSSOLUTIONSSTUARTMCCLUREJOELSCAMBRAYGEORGEKURTZNewYorkChicagoSanFranciscoLisbonLondonMadridMexicoCityMilanNewDelhiSanJuanSeoulSingaporeSydneyTorontoCopyrightbyTheMcGrawHillCompaniesAllrightsreservedExceptaspermittedundertheUnitedStatesCopyrightActof,nopartofthispublicationmaybereproducedordistributedinanyformorbyanymeans,orstoredinadatabaseorretrievalsystem,withoutthepriorwrittenpermissionofthepublisherISBN:MHID:ThematerialinthiseBookalsoappearsintheprintversionofthistitle:ISBN:,MHID:AlltrademarksaretrademarksoftheirrespectiveownersRatherthanputatrademarksymbolaftereveryoccurrenceofatrademarkedname,weusenamesinaneditorialfashiononly,andtothebenefitofthetrademarkowner,withnointentionofinfringementofthetrademarkWheresuchdesignationsappearinthisbook,theyhavebeenprintedwithinitialcapsMcGrawHilleBooksareavailableatspecialquantitydiscountstouseaspremiumsandsalespromotions,orforuseincorporatetrainingprogramsTocontactarepresentativepleasevisittheContactUspageatwwwmhprofessionalcomInformationhasbeenobtainedbyMcGrawHillfromsourcesbelievedtobereliableHowever,becauseofthepossibilityofhumanormechanicalerrorbyoursources,McGrawHill,orothers,McGrawHilldoesnotguaranteetheaccuracy,adequacy,orcompletenessofanyinformationandisnotresponsibleforanyerrorsoromissionsortheresultsobtainedfromtheuseofsuchinformationTERMSOFUSEThisisacopyrightedworkandTheMcGrawHillCompanies,Inc(“McGrawHill”)anditslicensorsreserveallrightsinandtotheworkUseofthisworkissubjecttothesetermsExceptaspermittedundertheCopyrightActofandtherighttostoreandretrieveonecopyofthework,youmaynotdecompile,disassemble,reverseengineer,reproduce,modify,createderivativeworksbasedupon,transmit,distribute,disseminate,sell,publishorsublicensetheworkoranypartofitwithoutMcGrawHill’spriorconsentYoumayusetheworkforyourownnoncommercialandpersonaluseanyotheruseoftheworkisstrictlyprohibitedYourrighttousetheworkmaybeterminatedifyoufailtocomplywiththesetermsTHEWORKISPROVIDED“ASIS”McGRAWHILLANDITSLICENSORSMAKENOGUARANTEESORWARRANTIESASTOTHEACCURACY,ADEQUACYORCOMPLETENESSOFORRESULTSTOBEOBTAINEDFROMUSINGTHEWORK,INCLUDINGANYINFORMATIONTHATCANBEACCESSEDTHROUGHTHEWORKVIAHYPERLINKOROTHERWISE,ANDEXPRESSLYDISCLAIMANYWARRANTY,EXPRESSORIMPLIED,INCLUDINGBUTNOTLIMITEDTOIMPLIEDWARRANTIESOFMERCHANTABILITYORFITNESSFORAPARTICULARPURPOSEMcGrawHillanditslicensorsdonotwarrantorguaranteethatthefunctionscontainedintheworkwillmeetyourrequirementsorthatitsoperationwillbeuninterruptedorerrorfreeNeitherMcGrawHillnoritslicensorsshallbeliabletoyouoranyoneelseforanyinaccuracy,errororomission,regardlessofcause,intheworkorforanydamagesresultingtherefromMcGrawHillhasnoresponsibilityforthecontentofanyinformationaccessedthroughtheworkUndernocircumstancesshallMcGrawHillandoritslicensorsbeliableforanyindirect,incidental,special,punitive,consequentialorsimilardamagesthatresultfromtheuseoforinabilitytousethework,evenifanyofthemhasbeenadvisedofthepossibilityofsuchdamagesThislimitationofliabilityshallapplytoanyclaimorcausewhatsoeverwhethersuchclaimorcausearisesincontract,tortorotherwiseFormybeautifulboys,ilufaanmw…ForSamantha,lumlg…tml!!!StuartTomylittleRockBand:youaremyidolsJoelTomylovingfamily,Anna,Alexander,andAllegra,whoprovideinspiration,guidance,andunwaveringsupportTomymom,Victoria,forhelpingmedefinemycharacterandforteachingmetoovercomeadversityGeorgeviHackingExposed:NetworkSecuritySecretsSolutionsABOUTTHEAUTHORSStuartMcClure,CISSP,CNE,CCSEWidelyrecognizedforhisextensiveandindepthknowledgeofsecurityproducts,StuartMcClureisconsideredoneoftheindustry’sleadingauthoritiesininformationsecuritytodayAwellpublishedandacclaimedsecurityvisionary,McClurehasovertwodecadesoftechnologyandexecutiveleadershipwithprofoundtechnical,operational,andfinancialexperienceStuartMcClureisVicePresidentofOperationsandStrategyfortheRiskComplianceBusinessUnitatMcAfee,whereheisresponsibleforthehealthandadvancementofsecurityriskmanagementandcomplianceproductsandservicesolutionsIn,StuartMcClurewasExecutiveDirectorofSecurityServicesatKaiserPermanente,theworld’slargesthealthmaintenanceorganization,whereheoversawsecurityprofessionalsandwasresponsibleforsecuritycompliance,oversight,consulting,architecture,andoperationsIn,McCluretookoverthetopspotasSeniorVicePresidentofGlobalThreats,runningallofAVERTAVERTisMcAfee’svirus,malware,andattackdetectionsignatureandheuristicresponseteam,whichincludesoverofthesmartestprogrammers,engineers,andsecurityprofessionalsfromaroundtheworldHisteammonitoredglobalsecuritythreatsandprovidedfollowthesunsignaturecreationcapabilitiesAmonghismanytacticalresponsibilities,McClurewasalsoresponsibleforprovidingstrategicvisionandmarketingfortheteamstoelevatethevalueoftheirsecurityexpertiseintheeyesofthecustomerandthepublicAdditionally,hecreatedthesemiannualSageMagazine,asecuritypublicationdedicatedtomonitoringglobalthreatsPriortotakingovertheAVERTteam,StuartMcClurewasSeniorVicePresidentofRiskManagementProductDevelopmentatMcAfee,Inc,wherehewasresponsiblefordrivingproductstrategyandmarketingfortheMcAfeeFoundstonefamilyofriskmitigationandmanagementsolutionsPriortohisroleatMcAfee,McClurewasfounder,president,andchieftechnologyofficerofFoundstone,Inc,whichwasacquiredbyMcAfeeinOctoberfor$MAtFoundstone,McClureledboththeproductvisionandstrategyforFoundstone,aswellasoperationalresponsibilitiesforalltechnologydevelopment,support,andimplementationMcCluredroveannualrevenuesoverpercenteveryyearsincethecompany’sinceptioninMcClurewasalsotheauthorofthecompany’sprimarypatent#,,In,hecreatedandcoauthoredHackingExposed:NetworkSecuritySecretsSolutions,thebestsellingcomputersecuritybook,withover,copiessoldtodateThebookhasbeentranslatedintomorethanlanguagesandisrankedthe#computerbookeversoldpositioningitasoneofthebestsellingsecurityandcomputerbooksinhistoryMcClurealsocoauthoredHackingExposedWindows(McGrawHillProfessional)andWebHacking:AttacksandDefense(AddisonWesley)PriortoFoundstone,McClureheldavarietyofleadershippositionsinsecurityandITmanagement,withErnstYoung’sNationalSecurityProfilingTeam,twoyearsasanindustryanalystwithInfoWorld’sTestCenter,fiveyearsasdirectorofITforbothstateAbouttheAuthorsviiandlocalCaliforniagovernment,twoyearsasownerofhisownITconsultancy,andtwoyearsinITwiththeUniversityofColorado,BoulderMcClureholdsabachelor’sdegreeinpsychologyandphilosophy,withanemphasisincomputerscienceapplicationsfromtheUniversityofColorado,BoulderHelaterearnednumerouscertificationsincludingISC’sCISSP,Novell’sCNE,andCheckPoint’sCCSEJoelScambray,CISSPJoelScambrayiscofounderandCEOofConsciere,aproviderofstrategicsecurityadvisoryservicesHehasassistedcompaniesrangingfromnewlymintedstartupstomembersoftheFortuneinaddressinginformationsecuritychallengesandopportunitiesforoveradozenyearsScambray’sbackgroundincludesrolesasanexecutive,technicalconsultant,andentrepreneurHewasaseniordirectoratMicrosoftCorporation,whereheledMicrosoft’sonlineservicessecurityeffortsforthreeyearsbeforejoiningtheWindowsplatformandservicesdivisiontofocusonsecuritytechnologyarchitectureJoelalsocofoundedsecuritysoftwareandservicesstartupFoundstone,Inc,andhelpedleadittoacquisitionbyMcAfeefor$MHehasalsoheldpositionsasaManagerforErnstYoung,ChiefStrategyOfficerforLeviathan,securitycolumnistforMicrosoftTechNet,EditoratLargeforInfoWorldMagazine,anddirectorofITforamajorcommercialrealestatefirmJoelScambrayhascoauthoredHackingExposed:NetworkSecuritySecretsSolutionssincehelpingcreatethebookinHeisalsoleadauthoroftheHackingExposedWindowsandHackingExposedWebApplicationsseries(bothfromMcGrawHillProfessional)Scambraybringstremendousexperienceintechnologydevelopment,IToperationssecurity,andconsultingtoclientsrangingfromsmallstartupstotheworld’slargestenterprisesHehasspokenwidelyoninformationsecurityatforumsincludingBlackHat,I,andTheAsiaEuropeMeeting(ASEM),aswellasorganizationsincludingCERT,TheComputerSecurityInstitute(CSI),ISSA,ISACA,SANS,privatecorporations,andgovernmentagenciessuchastheKoreanInformationSecurityAgency(KISA),FBI,andtheRCMPScambrayholdsabachelor’sofsciencefromtheUniversityofCaliforniaatDavis,anMAfromUCLA,andheisaCertifiedInformationSystemsSecurityProfessional(CISSP)GeorgeKurtz,CISSP,CISA,CPAFormerCEOofFoundstoneandcurrentSeniorVicePresidentGeneralManagerofMcAfee’sRiskComplianceBusinessUnit,GeorgeKurtzisaninternationallyrecognizedsecurityexpert,author,andentrepreneur,aswellasafrequentspeakeratmostmajorindustryconferencesKurtzhasoveryearsofexperienceinthesecurityspaceandhashelpedhundredsoflargeorganizationsandgovernmentagenciestacklethemostdemandingsecurityproblemsHehasbeenquotedorfeaturedinmanymajorpublications,mediaoutlets,andtelevisionprograms,includingCNN,FoxNews,ABCWorldNews,AssociatedPress,USAToday,WallStreetJournal,TheWashingtonPost,Time,ComputerWorld,eWeek,CNET,andothersviiiHackingExposed:NetworkSecuritySecretsSolutionsGeorgeKurtziscurrentlyresponsiblefordrivingMcAfee’sworldwidegrowthintheRiskCompliancesegmentsInthisrole,hehashelpedtransformMcAfeefromapointproductcompanytoaproviderofSecurityRiskManagementandComplianceOptimizationsolutionsDuringhistenure,McAfeehassignificantlyincreaseditsoverallenterpriseaveragesellingprice(ASP)anditscompetitivedisplacementsKurtzformerlyheldthepositionofSVPofMcAfeeEnterprise,wherehewasresponsibleforhelpingtodrivethegrowthoftheenterpriseproductportfolioonaworldwidebasisPriortohisroleatMcAfee,KurtzwasCEOofFoundstone,Inc,whichwasacquiredbyMcAfeeinOctoberInhispositionasCEO,KurtzbroughtauniquecombinationofbusinessacumenandtechnicalsecurityknowhowtoFoundstoneHavingraisedover$millioninfinancing,KurtzpositionedthecompanyforrapidgrowthandtookthecompanyfromstartuptooverpeopleandinfouryearsKurtz’sentrepreneurialspiritpositionedFoundstoneasoneofthepremier“pureplay”securitysolutionsprovidersintheindustryPriortoFoundstone,KurtzservedasaseniormanagerandthenationalleaderofErnstYoung’sSecurityProfilingServicesGroupDuringhistenure,KurtzwasresponsibleformanagingandperformingavarietyofeCommercerelatedsecurityengagementswithclientsinthefinancialservices,manufacturing,retailing,pharmaceuticals,andhightechnologyindustriesHewasalsoresponsibleforcodevelopingthe“ExtremeHacking”coursePriortojoiningErnstYoung,hewasamanageratPriceWaterhouse,wherehewasresponsiblefordevelopingtheirnetworkbasedattackandpenetrationmethodologiesusedaroundtheworldUnderGeorgeKurtz’sdirection,heandFoundstonehavereceivednumerousawards,includingInc’s“TopCompanies,”SoftwareCouncilofSouthernCalifornia’s“SoftwareEntrepreneuroftheYear”and“SoftwareCEOoftheYear,”FastCompany’s“Fast,”AmericanElectronicsAssociation’s“OutstandingExecutive,”Deloitte’s“Fast,”ErnstYoung’s“EntrepreneuroftheYearFinalist,”OrangeCounty’s“HottestPeople,”andothersKurtzholdsabachelorofsciencedegreefromSetonHallUniversityHealsoholdsseveralindustrydesignations,includingCertifiedInformationSystemsSecurityProfessional(CISSP),CertifiedInformationSystemsAuditor(CISA),andCertifiedPublicAccountant(CPA)HewasrecentlygrantedPatent#,,“Systemandmethodfornetworkvulnerabilitydetectionandreporting”AdditionalpatentsarestillpendingAbouttheContributingAuthorsNathanSportsmanisaninformationsecurityconsultantwhoseexperienceincludespositionsatFoundstone,adivisionofMcAfeeSymantecSunMicrosystemsandDellOvertheyears,SportsmanhashadtheopportunitytoworkacrossallmajorverticalsandhisclientshaverangedfromWallStandSiliconValleytogovernmentintelligenceagenciesandrenownededucationalinstitutionsHisworkspansseveralservicelines,buthespecializesinsoftwareandnetworksecuritySportsmanisalsoafrequentpublicspeakerHehaslecturedonthelatesthackingtechniquesfortheNationalSecurityAgency,servedasaninstructorfortheUltimateHackingSeriesatBlackHat,andisaregularpresenterforvarioussecurityorganizationssuchasISSA,Infragard,andAbouttheAuthorsixOWASPSportsmanhasdevelopedseveralsecuritytoolsandwasacontributortotheSolarisSoftwareSecurityToolkit(SST)IndustrydesignationsincludetheCertifiedInformationSystemsSecurityProfessional(CISSP)andGIACCertifiedIncidentHandler(GCIH)Sportsmanholdsabachelor’sofscienceinelectricalandcomputerengineeringfromTheUniversityofTexasatAustinBradAntoniewiczistheleaderofFoundstone’snetworkvulnerabilityandassessmentpenetrationservicelinesHeisaseniorsecurityconsultantfocusingoninternalandexternalvulnerabilityassessments,webapplicationpenetration,firewallandrouterconfigurationreviews,securenetworkarchitectures,andwirelesshackingAntoniewiczdevelopedFoundstone’sUltimateHackingwirelessclassandteachesbothUltimateHackingWirelessandthetraditionalUltimateHackingclassesAntoniewiczhasspokenatmanyevents,authoredvariousarticlesandwhitepapers,anddevelopedmanyofFoundstone’sinternalassessmenttoolsJonMcClintockisaseniorinformationsecurityconsultantlocatedinthePacificNorthwest,specializinginapplicationsecurityfromdesignthroughimplementationandintodeploymentHehasovertenyearsofprofessionalsoftwareexperience,coveringinformationsecurity,enterpriseandserviceorientedsoftwaredevelopment,andembeddedsystemsengineeringMcClintockhasworkedasaseniorsoftwareengineeronAmazoncom’sInformationSecurityteam,whereheworkedwithsoftwareteamstodefinesecurityrequirements,assessapplicationsecurity,andeducatedevelopersaboutsecuritysoftwarebestpracticesPriortoAmazon,JondevelopedsoftwareformobiledevicesandlowleveloperatingsystemanddevicedriversHeholdsabachelor’sofscienceincomputersciencefromCaliforniaStateUniversity,ChicoAdamCecchettihasoversevenyearsofprofessionalexperienceasasecurityengineerandresearcherHeisaseniorsecurityconsultantforLeviathanSecurityGrouplocatedinthePacificNorthwestCecchettispecializesinhardwareandapplicationpenetrationtestingHehasledassessmentsfortheFortuneinavastarrayofverticalsPriortoconsulting,hewasaleadsecurityengineerforAmazoncom,IncCecchettiholdsamaster’sdegreeinelectricalandcomputerengineeringfromCarnegieMellonUniversityAbouttheTechReviewerMichaelPrice,researchmanagerforMcAfeeFoundstone,iscurrentlyresponsibleforcontentdevelopmentfortheMcAfeeFoundstoneEnterprisevulnerabilitymanagementproductInthisrole,PriceworkswithandmanagesaglobalteamofsecurityresearchersresponsibleforimplementingsoftwarechecksdesignedtodetectthepresenceofvulnerabilitiesonremotecomputersystemsHehasextensiveexperienceintheinformationsecurityfield,havingworkedintheareasofvulnerabilityanalysisandsecuritysoftwaredevelopmentforovernineyearsThispageintentionallyleftblankxiATAGLANCEPartICasingtheEstablishmentFootprintingScanningEnumerationPartIISystemHackingHackingWindowsHackingUnixPartIIIInfrastructureHackingRemoteConnectivityandVoIPHackingNetworkDevicesWirelessHackingHackingHardwarePartIVApplicationandDataHackingHackingCodeWebHackingHackingtheInternetUserxiiHackingExposed:NetworkSecuritySecretsSolutionsPartVAppendixesAPortsBTopSecurityVulnerabilitiesCDenialofService(DoS)andDistributedDenialofService(DDoS)AttacksIndexxiiiCONTENTSForewordxixAcknowledgmentsxxiPrefacexxiiiIntroductionxxvPartICasingtheEstablishmentCaseStudyIAAASIt’sAllAboutAnonymi

类似资料

编辑推荐

爱心家肴 豆腐真嫩.pdf

【爱心家肴美食文化丛书】家常面点 彩色特惠版.pdf

比较联邦论:理论与实践.pdf

保卫自由主义.pdf

ASME PTC 4-2008 锅炉性能试验规程.pdf

职业精品

精彩专题

结婚彩礼真有那么重要吗?

原创于西周而后沿袭至今的彩礼,虽然被一部分家长奉为圭臬,但越来越多的年轻人对结婚必须要彩礼不以为然。彩礼引发的社会矛盾越来越受到关注,结婚是自己的事,如人饮水冷暖自知,至于要不要彩礼或者要多少彩礼,因人而异,因财力而已,不可一概而论。

用户评论

0/200
    暂无评论
上传我的资料

精选资料

热门资料排行换一换

  • 赵文敏公松雪斋全集2.pdf

  • 赵文敏公松雪斋全集1.pdf

  • 食疗本草.pdf

  • 三联生活周刊2011第31期.p…

  • 民国三大奇书-百弊放言.pdf

  • 民国名人传.贾逸君.pdf

  • [东坡拾瓦砾:苏东坡这个人].孙…

  • 当代着名老中医秘验方单方选(徐福…

  • 剑桥心理学词典The_Cambr…

  • 资料评价:

    / 720
    所需积分:5 立即下载

    意见
    反馈

    返回
    顶部