CARVIEW |


Security Warrior
Publisher: O'Reilly Media, Inc.
Pub. Date: January 12, 2004
Print ISBN-13: 978-0-596-00545-0
Pages in Print Edition: 552
Subscriber Rating:
[0 Ratings]
Overview
Top Sellers in this Category

Hacking: The Art of Exploitation, 2nd Edition
by Jon Erickson

Social Engineering: The Art of Human Hacking
by Christopher Hadnagy

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by Michael Hale Ligh; Steven Adair; Blake Hartstein; Matthew Richard

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by Dafydd Stuttard; Marcus Pinto

Hacking For Dummies® 3rd Edition
by Kevin Beaver
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
Subscriber Reviews
Average Rating: Based on 0 Ratings
No Subscribers have provided a review for this book.
Browse Similar Topics
Top Level Categories:
Information Technology & Software Development
Sub-Categories:
Information Technology & Software Development > Networking
Networking > Security
Some information on this page was provided using data from Amazon.com®. View at Amazon >
Table of Contents
Extras
The publisher has provided additional content related to this title.
Description | Content |
---|---|
Visit the catalog page for Security Warrior | |
Visit the errata page for Security Warrior | |
Download the supplemental electronic content for Security Warrior |
About Safari Books Online •
Terms of Service •
Gift Subscriptions •
Privacy Policy •
Contact Us •
Corporate Licenses •
Help •
Accessibility |
Copyright 2011Safari Books Online. All rights reserved.