Ebook: Hack Proofing Your Network
The book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine Recon, Research/Develop, Execute Attack and Achieve Goal, and Cleanup.
Download the book Hack Proofing Your Network for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)