Издательство: Syngress
Год издания: 2005
isbn: 1597490059
Количество страниц: 697
Язык: english
Формат: PDF (scan)
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
Автор: Ken Caruso, Chris Hurley
Издательство: Syngress
Год издания: 2005
isbn: 1-59749-040-7
Количество страниц: 465
Язык: english
Формат: PDF
With sexy hardware, a powerful operating system, and easy-to-use applications, Apple has made OS X the operating system of choice for hackers everywhere. But as great as OS X is out of the box, hackers are eager to push the limits of what it was designed to do (surprise). Tweak and tune both software and hardware to start penetration testing or software development. See how the best and brightest use OS X for cutting-edge research, development, and just plain fooling around. Add Interfaces to the Mac Add interfaces to create a multi-interface firewall or router, simulate a switch, add 802.3ad interface aggregation, or provide another media type. Use the Mac as a Router See how a small low-power device such as a Mac Mini or an iBook expanded with USB-based Ethernet ports can push packets between networks. WarDrive with Your Mac Configure and use the KisMAC WLAN discovery tool to WarDrive. Penetration Test with OS X Discover how all the best tools can be run from the Mac: nmap, Nessus, Ethereal, Snort, and more. Automate Your Mac! Learn how to use Automator, AppleScript, and the bash shell to automate tasks and create slick front ends for command-line favorites! Discover Juicy Mac Hacking Tools Compile Open Source tools directly on OS X using mainstream compilers and interpreters. Hack the iPod Open your iPod, replace the battery, upgrade a 5GB iPod's hard drive, and configure any iPod for Mac or Windows. Use OS X in a Windows Environment Access file shares on a Windows server, mount network file systems via AppleScript, and connect to a Windows PPTP server. PowerBook Mac Tricks Learn cool stunts you can do with the Apple motion sensor, the Apple Remote Desktop, Gestures, Sogudi, and more!
Автор: Paul Craig, Ron Honick
Издательство: Syngress
Год издания: 2005
isbn: 1-93226-698-4
Количество страниц: 329
Язык: english
Формат: PDF
For every $2 worth of software purchased legally, $1 worth of software is pirated illegally. For the first time ever, the dark underground of how software is stolen and traded over the internet is revealed. The technical detail provided will open the eyes of software users and manufacturers worldwide! This book is a tell-it-like-it-is expos of how tens of billions of dollars worth of software is stolen every year. Did you know that most of the software on your computer, and nearly every program you've heard of, can be obtained without charge? In less time than it would take you to drive down to your "friendly neighborhood computer store" and purchase a software program, you can download the exact same program from the internet for free! Obtaining something intended to be sold without paying is "controversial" to say the least. But whether you call if "free for the asking," "software piracy," or just out-and-out "stealing;" downloading, copying, and sharing software is being done by thousands of people everyday. This book explains the epidemic problem of software piracy in great detail for both software users and manufacturers.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-54-X
Количество страниц: 642
Язык: english
Формат: PDF
.NET is Microsoft's answer to the J2EE platform for Enterprise Web Services. It is essential that developers know C# if they are to program for the .NET platform. C# for Java Programmers is not an introductory guide to C#, rather it builds on what Java programmers already know about object-oriented languages to give them an efficient means to master the .NET framework. This book will compare and contrast many of the advantages and drawbacks of Java and C#, allowing programmers to make informed, intelligent decisions based on the unique uses of each language.
Автор: Chun Hai (Bernard) Cheah
Издательство: Syngress
Год издания: 2004
isbn: 1-931836-25-6
Количество страниц: 417
Язык: english
Формат: PDF
This book fills the need of Networking professionals responsible for configuring, maintaining and troubleshooting the security of Microsoft’s Internet Information Server 6.0. The book is organized around the security services offered by IIS. The table of contents reflects the hierarchy of topics within the IIS MMC, and covers any configuration option within IIS that relates to security. In some instances, references are made to non-IIS services, but only as they relate to or support the IIS service being discussed.
Автор: Tom Owad
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-40-X
Количество страниц: 369
Язык: english
Формат: PDF (scan)
The Apple I was really the computer designed from the ground up that would kick off personal computing on a large scale. But the Apple I took the biggest step of all. Some very simple concepts are very hard to do the first time. This computer told the world that small computers should never again come with geeky front panels, but rather with human keyboards, ready to type on.
Издательство: Syngress
Год издания: 2000
isbn: 1-928994-13-X
Количество страниц: 610
Язык: english
Формат: PDF
Covers the key protocols and connectivity considerations involved with using the Cisco line of routers and access servers to interconnect central sites to branch offices and support home office workers and telecommuters. Chapters discuss point-to-point protocol, virtual private network technology, ISDN, dial-on-demand routing, configuring and backing up permanent connections, security, and network address translation in remote access networks.
Издательство: Syngress
Год издания: 2003
isbn: 1-932266-69-0
Количество страниц: 673
Язык: english
Формат: PDF
This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. The concepts and information presented in this book are one step towards providing a more secure working and living network environment. This book also exists as a guide for Security Administrators seeking to pass the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100), which is associated with CCSP, Cisco IDS Specialist, and Cisco Security Specialist 1 certifications.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-63-9
Количество страниц: 658
Язык: english
Формат: PDF
The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereA???s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you. This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)
When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.