Security Warrior

Know Your Enemy

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Warrior by Cyrus Peikari, Anton Chuvakin, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Cyrus Peikari, Anton Chuvakin ISBN: 9780596552398
Publisher: O'Reilly Media Publication: January 12, 2004
Imprint: O'Reilly Media Language: English
Author: Cyrus Peikari, Anton Chuvakin
ISBN: 9780596552398
Publisher: O'Reilly Media
Publication: January 12, 2004
Imprint: O'Reilly Media
Language: English

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

More books from O'Reilly Media

Cover of the book BSD Hacks by Cyrus Peikari, Anton Chuvakin
Cover of the book Making Isometric Social Real-Time Games with HTML5, CSS3, and JavaScript by Cyrus Peikari, Anton Chuvakin
Cover of the book Access 2013: The Missing Manual by Cyrus Peikari, Anton Chuvakin
Cover of the book Essential Mac OS X Panther Server Administration by Cyrus Peikari, Anton Chuvakin
Cover of the book Hardcore Java by Cyrus Peikari, Anton Chuvakin
Cover of the book Spring Data by Cyrus Peikari, Anton Chuvakin
Cover of the book Ethernet Switches by Cyrus Peikari, Anton Chuvakin
Cover of the book Think Data Structures by Cyrus Peikari, Anton Chuvakin
Cover of the book Internet Forensics by Cyrus Peikari, Anton Chuvakin
Cover of the book Building Mobile Applications with Java by Cyrus Peikari, Anton Chuvakin
Cover of the book Learning DCOM by Cyrus Peikari, Anton Chuvakin
Cover of the book Designing Multi-Device Experiences by Cyrus Peikari, Anton Chuvakin
Cover of the book High Performance Images by Cyrus Peikari, Anton Chuvakin
Cover of the book Crafting the InfoSec Playbook by Cyrus Peikari, Anton Chuvakin
Cover of the book Learning Spark by Cyrus Peikari, Anton Chuvakin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy