Misc



Botnets: The Killer Web Applications
Author: Craig Schiller, Jim Binkley
Publisher: Syngress
Year: 2007
Pages: 504
Amazon's book description: The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date.




Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
Author: Edward Skoudis, Tom Liston
Publisher: Prentice Hall PTR
Year: 2006
Pages: 784
Amazon's book description: For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.




Google Hacking for Penetration Testers
Author: Johnny Long, Ed Skoudis, Alrik van Eijkelenborg
Publisher: Syngress
Year: 2005
Pages: 528
Amazon's book description: Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search.




The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Author: Kevin D. Mitnick, William L. Simon
Publisher: Wiley
Year: 2005
Pages: 288
Amazon's book description: Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them.




Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Author: Michal Zalewski
Publisher: No Starch Press
Year: 2005
Pages: 312
Amazon's book description: There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.




Security Warrior
Author: Cyrus Peikari, Anton Chuvakin
Publisher: O'Reilly Media
Year: 2004
Pages: 552
Amazon's book description: The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.




Gray Hat Hacking : The Ethical Hacker's Handbook
Author: Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
Publisher: McGraw-Hill Osborne Media
Year: 2004
Pages: 434
Amazon's book description: Analyze your company's vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker's Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.




The Art of Deception: Controlling the Human Element of Security
Author: Kevin D. Mitnick, William L. Simon
Publisher: Wiley
Year: 2003
Pages: 366
Amazon's book description: The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.