Learn how to beat hackers at their own game
Hack Attacks Denied
If you?ve read John Chirillo?s provocative work,Hack AttacksRevealed, you?re well on your way to understanding how hackers viewinternetworking technologies, the techniques they use to exploitnetwork security holes, and what you can do to recognize oncomingattacks.
Chirillo gives you step-by-step guidance on how to keep thehacks out of your network using the same powerful Tiger Box®tools that hackers use todetect and penetrate networkvulnerabilities. Drawing on his experience as a consultant hired byFortune 1000 companies to break into their corporate networks,Chirillo covers all the necessary security steps?from system todaemon?and helps you tie the information together to create ahighly effective security policy.
Correlating each phase of this book to one described in HackAttacks Revealed, Chirillo explains:
- Securing system infra-structure by protecting vulnerable portsand services, including well-known ports, concealed ports andservices, and discovery countermeasures
- How to detect and protect against intrusion?from backdoor andflooding attacks to mail bombing, viral infections, and Web pagehacking
- Essential technical hack countermeasures pertaining to populargateways and routers, Internet server daemons, operating systems,and proxies and firewalls
"Hack Attacks Revealed completely blows the other security booksout of the water. It was the book I was looking for when I boughtall the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)
"Speaking for the Air Force Computer Emergency Response Team, thesebooks vastly facilitate our operations involving intrusiondetection, incident response, and vulnerability assessment of AirForce automated information systems."
(L. Peterson, AFCERT)
"[Hack Attacks Denied] is quite extensive in providing theinformation that the users may need to prevent hack attacks."(HiTech Review)
"Whoever "you" are--sysadmin, internetworking engineer, or hacker(disaffected or otherwise), you'll find that Chirillo is sellingauthentic goods." (Bill Camarda, Slashdot)