Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006(1).pdf

(147421 KB) Pobierz
PRACTICAL HACKING
TECHNIQUES AND
COUNTERMEASURES
OTHER INFORMATION SECURITY BOOKS FROM AUERBACH
Assessing and Managing Security Risk in IT
Systems: A Structured Methodology
John McCumber
ISBN: 0-8493-2232-4
Audit and Trace Log Management: Consolidation
and Analysis
Phillip Q Maier
ISBN: 0-8493-2725-3
Building and Implementing Security Certification
and Accreditation Program
Patrick D Howard
ISBN: 0-8493-2062-3
The CISO Handbook: A Practical Guide to Securing
Your Company
Michael Gentile; Ronald D Collette; Thomas D August
ISBN: 0-8493-1952-8
The Complete Guide for CPP Examination
Preparation
James P Muuss; David Rabern
ISBN: 0-8493-2896-9
Curing the Patch Management Headache
Felicia M Nicastro
ISBN: 0-8493-2854-3
Cyber Crime Investigator's Field Guide,
Second Edition
Bruce Middleton
ISBN: 0-8493-2768-7
Database and Applications Security: Integrating
Information Security and Data Management
Bhavani Thuraisingham
ISBN: 0-8493-2224-3
The Ethical Hack: A Framework for Business Value
Penetration Testing
James S Tiller
ISBN: 0-8493-1609-X
Guide to Optimal Operational Risk and Basel II
Ioannis S Akkizidis; Vivianne Bouchereau
ISBN: 0-8493-3813-1
The Hacker's Handbook: The Strategy Behind
Breaking into and Defending Networks
Susan Young; Dave Aitel
ISBN: 0-8493-0888-7
The HIPAA Program Reference Handbook
Ross Leo
ISBN: 0-8493-2211-1
Information Security Architecture: An Integrated
Approach to Security in the Organization,
Second Edition
Jan Killmeyer Tudor
ISBN: 0-8493-1549-2
Information Security Cost Management
Ioana V. Bazavan; Ian Lim
ISBN: 0-8493-9275-6
Information Security: Design, Implementation,
Measurement, and Compliance
Timothy P. Layton
ISBN: 0-8493-7087-6
Information Security Fundamentals
Thomas R Peltier; Justin Peltier; John A Blackley
ISBN: 0-8493-1957-9
Information Security Management Handbook, Fifth
Edition, Volume 2
Harold F Tipton; Micki Krause
ISBN: 0-8493-3210-9
Information Security Management Handbook, Fifth
Edition, Volume 3
Harold F Tipton; Micki Krause
ISBN: 0-8493-9561-5
Information Security Policies and Procedures:
A Practitioner's Reference, Second Edition
Thomas R Peltier
ISBN: 0-8493-1958-7
Information Security Risk Analysis, Second Edition
Thomas R Peltier
ISBN: 0-8493-3346-6
Information Technology Control and Audit,
Second Edition
Frederick Gallegos; Daniel P Manson;
Sandra Senft; Carol Gonzales
ISBN: 0-8493-2032-1
Managing an Information Security and Privacy
Awareness and Training Program
Rebecca Herold
ISBN: 0-8493-2963-9
The Practical Guide to HIPAA Privacy and
Security Compliance
Kevin Beaver; Rebecca Herold
ISBN: 0-8493-1953-6
A Practical Guide to Security Assessments
Sudhanshu Kairab
ISBN: 0-8493-1706-1
Securing Converged IP Networks
Tyson Macaulay
ISBN: 0-8493-7580-0
The Security Risk Assessment Handbook:
A Complete Guide for Performing Security
Risk Assessments
Douglas J Landoll
ISBN: 0-8493-2998-1
Surviving Security: How to Integrate People,
Process, and Technology, Second Edition
Amanda Andress
ISBN: 0-8493-2042-9
Wireless Security Handbook
Aaron E Earle
ISBN: 0-8493-3378-4
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: orders@crcpress.com
PRACTICAL HACKING
TECHNIQUES AND
COUNTERMEASURES
Mark D. Spivey, CISSP
Boca Raton New York
Auerbach Publications is an imprint of the
Taylor & Francis Group, an informa business
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2007 by Mark D. Spivey
Auerbach is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed in the United States of America on acid-free paper
10 9 8 7 6 5 4 3 2 1
International Standard Book Number-10: 0-8493-7057-4 (Hardcover)
International Standard Book Number-13: 978-0-8493-7057-1 (Hardcover)
This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted
with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to
publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of
all materials or for the consequences of their use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or
other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any informa-
tion storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For orga-
nizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice:
Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Spivey, Mark D.
Practical hacking techniques and countermeasures / Mark D. Spivey.
p. cm.
Includes bibliographical references and index.
ISBN-13: 978-0-8493-7057-1
1. VMware. 2. Operating systems (Computers) 3. Virtual computer systems. I. Title.
QA76.76.O63S6755 2006
005.4’32--dc22
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the Auerbach Web site at
http://www.auerbach-publications.com
2006013484
Zgłoś jeśli naruszono regulamin