Thursday, September 23, 2010

HACK PROOFING YOUR INTERNET TRADECRAFT



Part I: Theory and Ideals
Chapter 1: Politics
Chapter 2 Laws of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology

Part II: Theory and Ideals
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow

Part III: Remote Attacks
Chapter 9: Sniffing
Chapter 10: Session Hijacking
Chapter 11: Spoofing: Attacks on Trusted Identity
Chapter: 12 Server Holes
Chapter 13: Client Holes
Chapter 14: Viruses, Trojan Horses, and Worms

Part IV: Reporting
Chapter 15 Reporting Security Problems


Get HACK PROOFING YOUR INTERNET TRADECRAFT  Ebook:

 http://www.ziddu.com/download/7898535/HACKPROOFINGyourNETWORKINTERNETTRADECRAFT.rar.html

No comments:

Post a Comment