Halting the Hacker

Halting the Hacker
Author :
Publisher : Prentice Hall Professional
Total Pages : 388
Release :
ISBN-10 : 0130464163
ISBN-13 : 9780130464163
Rating : 4/5 (163 Downloads)

Book Synopsis Halting the Hacker by : Donald L. Pipkin

Download or read book Halting the Hacker written by Donald L. Pipkin and published by Prentice Hall Professional. This book was released on 2003 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.


Halting the Hacker Related Books

Halting the Hacker
Language: en
Pages: 388
Authors: Donald L. Pipkin
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

DOWNLOAD EBOOK

Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and pr
Android Hacker's Handbook
Language: en
Pages: 583
Authors: Joshua J. Drake
Categories: Computers
Type: BOOK - Published: 2014-03-26 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the sma
Halting State
Language: en
Pages: 376
Authors: Charles Stross
Categories: Fiction
Type: BOOK - Published: 2007-10-02 - Publisher: Penguin

DOWNLOAD EBOOK

“Halting State [is] a near-future story that is at once over-the-top and compellingly believable.” – Vernor Vinge, author of Rainbows End In the year 2018
Breaking and Entering
Language: en
Pages: 309
Authors: Jeremy N. Smith
Categories: BIOGRAPHY & AUTOBIOGRAPHY
Type: BOOK - Published: 2019 - Publisher: Mariner Books

DOWNLOAD EBOOK

This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known
Hack the Stack
Language: en
Pages: 481
Authors: Stephen Watkins
Categories: Computers
Type: BOOK - Published: 2006-11-06 - Publisher: Elsevier

DOWNLOAD EBOOK

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapt