Misc |
|
Botnets: The Killer Web Applications |
Author: Craig Schiller, Jim Binkley |
Publisher: Syngress |
Year: 2007 |
Pages: 504 |
Amazon's book description: The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. |
|
|
|
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses |
Author: Edward Skoudis, Tom Liston |
Publisher: Prentice Hall PTR |
Year: 2006 |
Pages: 784 |
Amazon's book description: For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. |
|
|
|
Google Hacking for Penetration Testers |
Author: Johnny Long, Ed Skoudis, Alrik van Eijkelenborg |
Publisher: Syngress |
Year: 2005 |
Pages: 528 |
Amazon's book description: Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. |
|
|
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers |
Author: Kevin D. Mitnick, William L. Simon |
Publisher: Wiley |
Year: 2005 |
Pages: 288 |
Amazon's book description: Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. |
|
|
|
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks |
Author: Michal Zalewski |
Publisher: No Starch Press |
Year: 2005 |
Pages: 312 |
Amazon's book description: There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems. |
|
|
|
Security Warrior |
Author: Cyrus Peikari, Anton Chuvakin |
Publisher: O'Reilly Media |
Year: 2004 |
Pages: 552 |
Amazon's book description: The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. |
|
|
|
Gray Hat Hacking : The Ethical Hacker's Handbook |
Author: Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester |
Publisher: McGraw-Hill Osborne Media |
Year: 2004 |
Pages: 434 |
Amazon's book description: Analyze your company's vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker's Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position. |
|
|
|
The Art of Deception: Controlling the Human Element of Security |
Author: Kevin D. Mitnick, William L. Simon |
Publisher: Wiley |
Year: 2003 |
Pages: 366 |
Amazon's book description: The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios. |
|
|