|
Code Hacking: A Developer`s Guide to Network Security provides a handson approach to learning vital security skills needed to protect your systems. It details the software and techniques hackers use and provides practical insights on what`s really important in understanding hacking issues. The book cuts through the cursory issues and quickly delves into the essentials at a code and implementation level. It teaches users how to write and use scanners, sniffers, exploits, and helps developers write network security test harnesses for application and infrastructure. In addition, it explains how to create passive defense strategies to collect data on hackers, as well as how to use active defense strategies through techniques such as penetration testing. Unlike other books on hacking, Code Hacking covers hacking issues using a variety of languages. Software explanations and code samples are provided in C#, C++, Java, and Perl, allowing developers to learn from a variety of perspectives. The companion CDROM contains a custom security scanner written in C#. This scanner is a combination of a port and vulnerability scanner that scans IP addresses, allows certain services to be "brute forced," and exploits wellknown vulnerabilities. By knowing how to hack a system you`ll be better prepared to secure your own. KEY FEATURESCovers the essential issues of network security, including firewalls, DMZ & NAT architecture, authentication, encryption, Web hacking, application hacks, operating system vulnerabilities, writing exploits, and wireless LANs Outlines hacking techniques and software, and provides a history of hacking with the appropriate context for the evolution in code applications, and exploits Provides software explanations and code examples in C#, Perl, Java, and C++.This book/CDROM package provides a handson approach to security skills needed to protect computer systems. Issues are discussed at the code and implementation levels, with instructions on writing and using scanners, sniffers, and network security test harnesses, and on creating passive defense strategies to collect data on hackers. Software explanations and code samples are provided in C#, C++, Java, and Perl. The CDROM contains a custom security scanner written in C#. Conway has contributed to other books on computing. Cordingley is a security architect for the UK government`s eGovernment Initiatives.
|
|
|