Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Table of Contents:
Introduction
I Setting the Stage
Chapter 1 - Why Did I Write This Book?
Chapter 2 - How This Book Will Help You
Chapter 3 - Hackers and Crackers
Chapter 4 - Just Who Can Be Hacked, Anyway?
II Understanding the Terrain
Chapter 5 - Is Security a Futile Endeavor?
Chapter 6 - A Brief Primer on TCP/IP
Chapter 7 - Birth of a Network: The Internet
Chapter 8 - Internet Warfare
III Tools
Chapter 9 - Scanners
Chapter 10 - Password Crackers
Chapter 11 - Trojans
Chapter 12 - Sniffers
Chapter 13 - Techniques to Hide One's Identity
Chapter 14 - Destructive Devices
IV Platforms and Security
Chapter 15 - The Hole
Chapter 16 - Microsoft
Chapter 17 - UNIX: The Big Kahuna
Chapter 18 - Novell
Chapter 19 - VAX/VMS
Chapter 20 - Macintosh
Chapter 21 - Plan 9 from Bell Labs
V Beginning at Ground Zero
Chapter 22 - Who or What Is Root?
Chapter 23 - An Introduction to Breaching a Server Internally
Chapter 24 - Security Concepts
VI The Remote Attack
Chapter 25 - The Remote Attack
Chapter 26 - Levels of Attack
Chapter 27 - Firewalls
Chapter 28 - Spoofing Attacks
Chapter 29 - Telnet-Based Attacks
Chapter 30 - Language, Extensions, and Security
VII The Law
Chapter 31 - Reality Bytes: Computer Security and the Law
VIII Appendixes
Appendix A - How to Get More Information
Appendix B - Security Consultants
Appendix C - A Hidden Message About the Internet
Appendix D - What's on the CD-ROM
©
Copyright
, Macmillan Computer Publishing. All rights reserved.