
Security Warrior
US $29.00US $29.00
Thu, 31 Jul, 04:06Thu, 31 Jul, 04:06
Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Security Warrior
US $29.00
ApproximatelyEUR 25.41
Condition:
New
A new, unread, unused book in perfect condition with no missing or damaged pages. See the seller's listing for full details.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free USPS Media MailTM.
Located in: Brooklyn, New York, United States
Delivery:
Estimated between Fri, 8 Aug and Thu, 14 Aug to 94104
Returns:
No returns accepted.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:165109134434
Item specifics
- Condition
- Book Title
- Security Warrior
- ISBN
- 9780596005450
About this product
Product Identifiers
Publisher
O'reilly Media, Incorporated
ISBN-10
0596005458
ISBN-13
9780596005450
eBay Product ID (ePID)
5985230
Product Key Features
Number of Pages
556 Pages
Publication Name
Security Warrior : Know Your Enemy
Language
English
Publication Year
2004
Subject
Networking / Intranets & Extranets, Networking / General, Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1 in
Item Weight
27.1 Oz
Item Length
9.2 in
Item Width
7 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2004-300981
Illustrated
Yes
Table Of Content
Dedication Preface Part I: Software Cracking Chapter 1: Assembly Language Chapter 2: Windows Reverse Engineering Chapter 3: Linux Reverse Engineering Chapter 4: Windows CE Reverse Engineering Chapter 5: Overflow Attacks Part II: Network Stalking Chapter 6: TCP/IP Analysis Chapter 7: Social Engineering Chapter 8: Reconnaissance Chapter 9: OS Fingerprinting Chapter 10: Hiding the Tracks Part III: Platform Attacks Chapter 11: Unix Defense Chapter 12: Unix Attacks Chapter 13: Windows Client Attacks Chapter 14: Windows Server Attacks Chapter 15: SOAP XML Web Services Security Chapter 16: SQL Injection Chapter 17: Wireless Security Part IV: Advanced Defense Chapter 18: Audit Trail Analysis Chapter 19: Intrusion Detection Systems Chapter 20: Honeypots Chapter 21: Incident Response Chapter 22: Forensics and Antiforensics Part V: Appendix Appendix A: Useful SoftICE Commands and Breakpoints Colophon
Synopsis
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the ......, When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands., When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle."Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability."Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands., When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
LC Classification Number
TK5105.59.P44985
Item description from the seller
About this seller
myoddsandends
100% positive Feedback
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Seller Feedback (267)
- e***c (1522)- Feedback left by buyer.Past monthVerified purchase.
- p***a (1079)- Feedback left by buyer.Past monthVerified purchaseItem as described. Shipped quickly and safely.
- 7***6 (2128)- Feedback left by buyer.Past monthVerified purchasevery nice
More to explore:
- Warriors Fiction Fiction & Books,
- Warriors Fiction Paperback Fiction & Books,
- Warriors Fiction Hardcover Books,
- Warriors Fiction HarperCollins Fiction & Non-Fiction Books,
- Non-Fiction Fiction Books & Security,
- Non-Fiction Computer Security Fiction & Non-Fiction Books,
- Politics & Society Non-Fiction Fiction Books & Security,
- Non-Fiction McGraw-Hill Security Fiction & Books,
- Non-Fiction Security Fiction Books & 1950-1999 Publication Year,
- Non-Fiction Security Fiction Books & 1900-1949 Publication Year