[ Pobierz całość w formacie PDF ]
PRACTICAL HACKING TECHNIQUES AND COUNTERMEASURES OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Assessing and Managing Security Risk in IT Systems: A Structured Methodology John McCumber ISBN: 0-8493-2232-4 Audit and Trace Log Management: Consolidation and Analysis Phillip Q Maier ISBN: 0-8493-2725-3 Building and Implementing Security Certification and Accreditation Program Patrick D Howard ISBN: 0-8493-2062-3 The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile; Ronald D Collette; Thomas D August ISBN: 0-8493-1952-8 The Complete Guide for CPP Examination Preparation James P Muuss; David Rabern ISBN: 0-8493-2896-9 Curing the Patch Management Headache Felicia M Nicastro ISBN: 0-8493-2854-3 Cyber Crime Investigator's Field Guide, Second Edition Bruce Middleton ISBN: 0-8493-2768-7 Database and Applications Security: Integrating Information Security and Data Management Bhavani Thuraisingham ISBN: 0-8493-2224-3 The Ethical Hack: A Framework for Business Value Penetration Testing James S Tiller ISBN: 0-8493-1609-X Guide to Optimal Operational Risk and Basel II Ioannis S Akkizidis; Vivianne Bouchereau ISBN: 0-8493-3813-1 The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks Susan Young; Dave Aitel ISBN: 0-8493-0888-7 The HIPAA Program Reference Handbook Ross Leo ISBN: 0-8493-2211-1 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer Tudor ISBN: 0-8493-1549-2 Information Security Cost Management Ioana V. Bazavan; Ian Lim ISBN: 0-8493-9275-6 Information Security: Design, Implementation, Measurement, and Compliance Timothy P. Layton ISBN: 0-8493-7087-6 Information Security Fundamentals Thomas R Peltier; Justin Peltier; John A Blackley ISBN: 0-8493-1957-9 Information Security Management Handbook, Fifth Edition, Volume 2 Harold F Tipton; Micki Krause ISBN: 0-8493-3210-9 Information Security Management Handbook, Fifth Edition, Volume 3 Harold F Tipton; Micki Krause ISBN: 0-8493-9561-5 Information Security Policies and Procedures: A Practitioner's Reference, Second Edition Thomas R Peltier ISBN: 0-8493-1958-7 Information Security Risk Analysis, Second Edition Thomas R Peltier ISBN: 0-8493-3346-6 Information Technology Control and Audit, Second Edition Frederick Gallegos; Daniel P Manson; Sandra Senft; Carol Gonzales ISBN: 0-8493-2032-1 Managing an Information Security and Privacy Awareness and Training Program Rebecca Herold ISBN: 0-8493-2963-9 The Practical Guide to HIPAA Privacy and Security Compliance Kevin Beaver; Rebecca Herold ISBN: 0-8493-1953-6 A Practical Guide to Security Assessments Sudhanshu Kairab ISBN: 0-8493-1706-1 Securing Converged IP Networks Tyson Macaulay ISBN: 0-8493-7580-0 The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J Landoll ISBN: 0-8493-2998-1 Surviving Security: How to Integrate People, Process, and Technology, Second Edition Amanda Andress ISBN: 0-8493-2042-9 Wireless Security Handbook Aaron E Earle ISBN: 0-8493-3378-4 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com PRACTICAL HACKING TECHNIQUES AND COUNTERMEASURES Mark D. Spivey, CISSP Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2007 by Mark D. Spivey Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-10: 0 -8493 -7057-4 (Hardcover) International Standard Book Number-13: 978-0-8493-7057-1 (Hardcover) is book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any informa- tion storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For orga- nizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Spivey, Mark D. Practical hacking techniques and countermeasures / Mark D. Spivey. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8493-7057-1 1. VMware. 2. Operating systems (Computers) 3. Virtual computer systems. I. Title. QA76.76.O63S6755 2006 005.4’32--dc22 2006013484 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach-publications.com [ Pobierz całość w formacie PDF ] |
Podobne
|