| Share this post! | Vote this! |
|
THIS INCLUDES :
· Up-to-date techniques and countermeasures for preventing the exploitation of UNIX systems
· New chapter on hacking code, covering the ways flaws get introduced into software and how best to prevent their ubiquitous spread
· New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits
· Updated denial of service chapter with from-the-trenches descriptions of largescale zombie attacks and practical countermeasures
· Coverage of new web hacking tools and techniques, including HTTP response splitting and automated vulnerability scanners
· Totally revised chapter on hacking Internet users, covering the newest IE exploits, online services security, sociotechnical attacks like phishing, and the newest malware techniques including Windows rootkits techniques
· Coverage of new wireless hacks
· New content on remote connectivity including VoIP hacking
· New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots
· New hacks using Google as a reconnaissance tool
· An updated footprinting chapter that deals with all the inevitable changes in finding information from various internet databases
· Brand-new case studies covering relevant and timely security attacks including Google, wireless, and Mac OS X hacks. More...




0 comments:
Post a Comment