Imagen del editor

Hackers attack and defense guru (with CD-ROM)


ISBN 10: 7900729801 / ISBN 13: 9787900729804
Nuevos Condición: New Encuadernación de tapa blanda
Librería: liu xing (JiangSu, JS, China)

Librería en AbeBooks desde: 7 de abril de 2009

Cantidad disponible: 1

Comprar nuevo
Precio: EUR 299,35 Convertir moneda
Gastos de envío: Gratis De China a Estados Unidos de America Destinos, gastos y plazos de envío
Añadir al carrito


Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 304 Publisher: Computer News electronic audio-visual Pub. Date :2008-05-01 version 1. Hackers can be said that the emergence of today's information society for all to see. a unique phenomenon can not be ignored. Some hacker network attacks unintentionally or intentionally caused varying degrees of social harm. In order to safeguard the security of the information society. the book based on objective evidence-based. and combined with the author's long-term experiments and experiences. from multiple perspectives to analyze the hacker attack and defense of the whole process. The book is divided into three 13 chapters. including Chapter 1 to Chapter 3 Introduction to Basics for the hacker. including IP. port scanning and other network-based knowledge. Chapter 4 to Chapter 1l articles for the offensive and defensive combat hackers. including remote control. Trojan implanted. sniffer monitor. QQ hacking. etc. to help readers truly understand hacking techniques. so as to achieve effective prevention. Chapter 12 and 13 applications for the password policy chapter. describes the methods of hackers to crack passwords. and pointed out the main points of information security. This book is by no means bad motives to those who provide support. but to awaken people to maximize awareness of network security. information security crisis in the face for fans of the network technology. network administrators and information security people to read. Contents: Introduction The Basics first hacker hacking Chapter 1 of the network and network-based hacker 1.1.1 1.1 What is the process of hacking hacker 1.1.2 1.2 1.2.1 What is the understanding of the IP address of the public IP address 1.2.2 Network IP and dynamic IP and private IP1.2.3 fixed IP1.2.4 private IP address subnet mask segments 1.2.5IP category 1.2.6 1.2.7 IP segment 1.2.8NAT special loop network address translation protocol 1.3 and 1.3 ports .1 What is the port the port classification 1.3.3 1.3.2 1.3.4 common view port port port 1.4 1.3.5 limits the significance of identifying the operating system virtual machines Chapter 2 Chapter 3. information and training targeting the second scan and Hackers attack and defense combat chapter chapter Chapter 4 Systems back door and exploits the remote control process in Chapter 5 Chapter 6 Trojans open the presentation after the invasion and prevent the implantation of Trojan Chapter 7 and Chapter 8 of the whereabouts of hidden ways and clean up traces of Chapter 9 Sniffer intercepts the data and prevent Chapter 10 Chapter 11 QQ offensive and defensive combat third e-mail battle password policy (Application) Chapter 12 passwords to prevent password cracking and Chapter 13. Data Encryption and decryptionFour Satisfaction guaranteed,or money back. N° de ref. de la librería LJ0482

Hacer una pregunta a la librería

Detalles bibliográficos

Título: Hackers attack and defense guru (with CD-ROM...

Encuadernación: paperback

Condición del libro:New

Acerca de


Paperback. Pub Date: 2008. Pages: 304 Language: Chinese in Publisher: Electronic Audio and Video Publishing House hacker emergence of the computer reported it can be said that in today's information society for all to see. a unique phenomenon can not be ignored. Some hacker network attacks behavior accidentally or intentionally caused varying degrees of harm to society. In order to defend the security of the information society. the book based on an objective instance. and combined the experiences of long-term experiments. analysis hacker attack and defense from multiple angles. The book is divided into three 13. Chapter 1 to Chapter 3 for the hacker entry Basics including IP. port scanning and network basics. Chapter 4 to the 1l chapter for hackers offensive and defensive combat chapter. including the contents of the remote control Trojan implanted. sniffer listens. QQ hack...

"Sobre este título" puede pertenecer a otra edición de este libro.

Descripción de la librería

Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!

Ver la página web de la librería

Condiciones de venta:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

Más información
Condiciones de envío:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

Todos los libros de esta librería

Métodos de pago
aceptados por la librería

Visa Mastercard American Express Carte Bleue

PayPal Transferencia Bancaria