Summary and Info
The book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine Recon, Research/Develop, Execute Attack and Achieve Goal, and Cleanup.
More About the Author
Ed Mitchell (born 1953) is a British former television presenter, business journalist and news reader, best known for his work with ITN.
Review and Comments
Rate the Book
Hack Proofing Your Network 0 out of 5 stars based on 0 ratings.