Special OPS: Host and Network Security for Microsoft, Unix and Oracle (2025)

英文 [en], .pdf, 🚀/lgli/lgrs/nexusstc/upload/zlib, 17.8MB, 📘 書籍(非小說), upload/wll/ENTER/Science/IT & AI/IT Library/Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf

描述

"Special Ops is an adrenaline-pumping tour of the most critical security weaknesses present on most any corporate network today...-Joel Scambray, Senior Director, Microsoft's MSN, and Co-Author, Hacking Exposed Fourth Edition, Windows 2000, and Web Hacking Editions"Special Ops has brought some of the best speakers and researchers of computer security together to cover what you need to know to survive in today's net.-Jeff Moss, President & CEO, Black Hat, Inc.Special Ops brings perspective from today's best computer security minds into a single, enormously informative book. -Mike Schiffman, Director of Security Architecture, @stake, Inc., and Author of Building Open Source Network Security Tools and The Hacker's Challenge SeriesSpecial Ops: Host and Network Security for Microsoft, UNIX, and Oracle provides solutions for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? Have you considered the damage that could be done by recently laid-off or disgruntled employees, contractors and consultants, building security guards, cleaning staff, and of course the unsecured wireless network? This is the one book you need to defend the soft, chewy center of internal networks.

替代文件名

lgrsnf/dvd37/Birkholz E., Burnett M. - Special OPS. Host and Network Security for Microsoft, Unix and Oracle(2003)(784).pdf

替代文件名

lgli/dvd37/Birkholz E., Burnett M. - Special OPS. Host and Network Security for Microsoft, Unix and Oracle(2003)(784).pdf

替代文件名

nexusstc/Special OPS: Host and Network Security for Microsoft, Unix and Oracle/2a6d4740f27fc418768224d36ee6d4d0.pdf

替代标题

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)

替代标题

Hacking exposed Windows 2000 : network security, secrets & [and] solutions

替代标题

Exchange server 5.5: Проблемы и решения

替代标题

Windows 2000 (Hacking Exposed)

替代标题

Exchange Server 5.5 : 24 seven

替代标题

Exchange 2000 server : 24seven

替代标题

Exchange Server 2000 24seven

替代标题

Hacking Windows 2000 exposed

替代作者

McClure, Stuart, Scambray, Joel, Kurtz, George

替代作者

Stuart McClure, Joel Scambray, George Kurtz

替代作者

Scambray, Joel, McClure, Stuart

替代作者

Joel Scambary

替代作者

Макби, Джим

替代作者

McBee, Jim

替代作者

Jim MacBee

替代作者

Джим Макби

替代出版社

McGraw-Hill School Education Group

替代出版社

John Wiley & Sons, Incorporated

替代出版社

Irwin Professional Publishing

替代出版社

McGraw-Hill Osborne Media

替代出版社

Computing Mcgraw-Hill

替代出版社

Osborne/McGraw-Hill

替代出版社

Sybex/Network Press

替代出版社

Osborne McGraw-Hill

替代出版社

Sybex, Incorporated

替代出版社

Oracle Press

替代出版社

Питер

替代版次

John Wiley & Sons, Inc. (trade), Alameda, Calif, 2002

替代版次

24seven, San Francisco, London, California, 2002

替代版次

Для профессионалов, СПб. и др, Russia, 2000

替代版次

4th ed, Berkeley Calif. ; London, ©2003

替代版次

United States, United States of America

替代版次

San Francisco, California, 1999

替代版次

New York, New York State, 2001

替代版次

1st edition, November 15, 2001

替代版次

24seven, Alameda, Calif, ©2002

替代版次

24seven, San Francisco, ©1999

替代版次

4 edition, February 25, 2003

替代版次

4th edition, New York, 2003

替代版次

4th ed, New York, cop. 2003

替代版次

San Francisco, Calif, 2001

替代版次

San Francisco, cop. 1999

替代版次

First Edition, PT, 2001

替代版次

Berkeley, Calif, ©2001

替代版次

Berkeley, 1983

替代版次

1, US, 2001

替代版次

1, PS, 1999

元数据评论

mexmat -- 37

元数据评论

lg54322

元数据评论

producers:
Acrobat Distiller 4.0 for Macintosh

元数据评论

{"edition":"1","isbns":["0072192623","0072227427","0782125050","0782127975","9780072192629","9780072227420","9780782125054","9780782127973"],"last_page":1042,"publisher":"McGraw-Hill Companies","series":"Hacking Exposed"}

元数据评论

Includes index.

元数据评论

Доп. тит. л. изд.: San Francisco, etc, англ.
На тит. л. в вых. дан.: Санкт-Петербург, Москва, Харьков, Минск
Указ.

元数据评论

РГБ

元数据评论

Russian State Library [rgb] MARC:
=001 000657050
=003 RuMoRGB
=005 20020129120000.0
=008 000629s2000\\\\ru\||||\|\\\\\|01\u\rus\d
=017 \\ $a 00-24986 $b РКП
=020 \\ $a 5-272-00066-8
=020 \\ $a 0-7821-2505-0 (англ.)
=035 \\ $a (RuMoRGB)KNO-0107110
=040 \\ $a RuMoRGB $b rus $c RuMoRGB
=041 0\ $a rus
=084 \\ $a З973.233.02-018.2,07 $2 rubbk
=100 1\ $a Макби, Джим
=245 00 $a Exchange server 5.5 : $b Проблемы и решения $c Джим Макби
=260 \\ $a СПб. и др. $b Питер $c 2000
=300 \\ $a 621 с. $b ил. $c 24 см
=440 \0 $a Для профессионалов
=500 \\ $a Доп. тит. л. изд.: San Francisco, etc, англ.
=500 \\ $a На тит. л. в вых. дан.: Санкт-Петербург, Москва, Харьков, Минск
=555 \\ $a Указ.
=650 \7 $a Информационные системы и сети -- Операционные системы -- Пособие для специалистов $2 rubbk
=852 \\ $a РГБ $b FB $j 3 00-20/61-2 $x 90
=852 \\ $a РГБ $b FB $j 3 00-20/62-0 $x 90

替代描述

From the best-selling co-authors of the world-renowned book,Hacking Exposed,comes Hacking Windows 2000 Exposed. You'll learn,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption,domain control,Web and IIS 5 communications,LM/NTLM protocols,Active Directory,NetBIOS services,and much more. <p>Learn how to secure Windows 2000 from the hacker's perspective Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins,fraud,sabotage,and DoS downtime are constant realities in this target-rich environment. <b>Hacking Exposed Windows 2000: Network Security Secrets ; Solutions</b> will teach you,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks,from the mundane to the sophisticated,and detailed countermeasures to protect against them.</p><p>What You'll Learn:</p><ul><li>The proven Hacking Exposed methodology to locate,exploit,and patch vulnerable systems</li><li>How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!)</li><li>How to implement and proactively prevent the newest IIS 5 hacks,including remote buffer overflow attacks,the Code Red Worm,file system traversal,and source code disclosure</li><li>SQL and Terminal Server penetration and defense</li><li>Bypassing Windows 2000 IPSec filters and defeatingthe Encrypting File System</li><li>Using privilege escalation exploits to run code as SYSTEM</li><li>Active Directory and SNMP exploitation</li><li>How attackers extract password hashes,crack them,and install remote control back doors</li><li>Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls</li><li>Debilitating Denial of Service attacks</li><li>Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences</li><li>How to use built-in Windows 2000 technologies like IPSec,Kerberos,Group Policy,Security Templates and Security Configuration and Analysis like the experts to keep you systems secure</li><li>What the new generation of Windows portends for security,including analyses of Windows XP and Windows. NET Server,code named Whistler</li></ul> <p>From the best-selling co-authors of the world-renowned book, <i>Hacking Exposed</i>, comes <i>Hacking Windows 2000 Exposed</i>. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.</p>

替代描述

<i>"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure."</i> --Bill Machrone, PC Magazine
<p>This brand-new edition of the best-selling security book covers all the latest hacks and countermeasures and includes a bonus DVD with the authors' famous "Hacking Exposed Live" presentation!</p>
<p>Stuart McClure is the coauthor of all four editions of <i>Hacking Exposed</i> as well as of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072192623"><i>Hacking Exposed Windows 2000</i></a>. Stuart co-authored "Security Watch," a weekly column in InfoWorld addressing topical security issues, exploits, and vulnerabilities. He is the President/CTO of Foundstone, Inc. Prior to co-founding Foundstone, Stuart was a Senior Manager with Ernst &amp; Young's Security Profiling Services Group, responsible for project management, attack and penetration reviews, and technology evaluations. Stuart trains Foundstone's Ultimate Hacking course, and Hacking Exposed Live for conferences such as Networld + InterOp, Black Hat, RSA, CSI, among others.</p>
<p>Joel Scambray, CISSP, is the co-author of all four editions of <i>Hacking Exposed</i> as well as of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=007222438X"><i>Hacking Exposed Web Applications</i></a> and <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072192623"><i>Hacking Exposed Windows 2000</i></a>. Joel co-authored "Security Watch," a weekly column in InfoWorld. Joel is the author of Microsoft's "Ask Us About ... Security" Monthly Column. He also taught Foundstone's Ultimate Hacking Windows course.</p>
<p>George Kurtz, CISSP, is the co-author of all four editions of <i>Hacking Exposed</i> and of both editions of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072225645"><i>Hacking Linux Exposed.</i></a> He is the CEO of Foundstone, a cutting edge security solutions provider. Mr. Kurtz has significant experience with intrusion detection and firewall technologies, incident response procedures, and remote access solutions. As CEO and co-founder of Foundstone, George provides a unique combination of business acumen and technical security know-how.</p>

替代描述

<p><b>For experienced Exchange Server administrators.</b> At last, here's the book that you and other Exchange Server administrators have been waiting for. Starting where other books and training courses end and the real world begins, Exchange 2000 Server 24seven provides the detailed information that will make you a true expert.</p><p><b>Written to build on the knowledge you already have.</b> Inside, Exchange Server expert Jim McBee delivers the targeted instruction and inside tips you need to get the most out of your Exchange Server implementation. Coverage includes:</p><ul><li>Managing Exchange 2000 features in Active Directory</li><li>Choosing the correct approach to migration</li><li>Restricting server access</li><li>Scaling Exchange Server to meet your organization's needs</li><li>Detecting problems affecting uptime and mail delivery</li><li>Performing backup and disaster recovery procedures</li><li>Managing Exchange 2000 database operations</li><li>Implementing an Exchange 2000 cluster</li><li>Creating a public folder infrastructure</li><li>Understanding message routing and designing routing groups</li><li>Implementing and troubleshooting Internet clients</li></ul><p class=null1>24seven: The Advanced Information You Can't Find Anywhere Else</p><p class=null1>Other books in the series include:</p><ul><li>Firewalls 24seven</li><li>Windows 2000 24seven</li><li>Cisco Routers 24seven</li><li>TCP/IP 24seven</li></ul><p>Keep your systems and networks up and running 24 hours a day, 7 days a week, 52 weeks a year, with the 24seven series from Sybex.</p> <p>This guide to Exchange 2000 Server covers issues such as integrating migration, backup and recovery, streamlining daily maintenance, client and server automation, and securing servers against attack.</p>

替代描述

For experienced Exchange Server administrators. At last, here's the book that you and other Exchange Server administrators have been waiting for. Starting where other books and training courses end and the real world begins, Exchange 2000 Server 24seven provides the detailed information that will make you a true expert. Written to build on the knowledge you already have. Inside, Exchange Server expert Jim McBee delivers the targeted instruction and inside tips you need to get the most out of your Exchange Server implementation. Coverage includes: Managing Exchange 2000 features in Active Directory Choosing the correct approach to migration Restricting server access Scaling Exchange Server to meet your organization's needs Detecting problems affecting uptime and mail delivery Performing backup and disaster recovery procedures Managing Exchange 2000 database operations Implementing an Exchange 2000 cluster Creating a public folder infrastructure Understanding message routing and designing routing groups Implementing and troubleshooting Internet clients 24seven: The Advanced Information You Can't Find Anywhere Else Other books in the series include: Firewalls 24seven Windows 2000 24seven Cisco Routers 24seven TCP/IP 24seven Keep your systems and networks up and running 24 hours a day, 7 days a week, 52 weeks a year, with the 24seven series from Sybex.

替代描述

Cover......Page 1
Contents......Page 14
1 - Assessing Internal Network Security......Page 26
2 - Inventory and Exposure of Corporate Assets......Page 46
3 - Hunting for High Severity Vulnerabilities (HSV)......Page 74
4 - Attacking and Defending Windows XP Professional......Page 110
5 - Attacking and Defending Windows 2000......Page 196
6 - Securing Active Directory......Page 268
7 - Securing Exchange and Outlook Web Access......Page 328
8 - Attacking and Defending DNS......Page 418
9 - Attacking and Defending Microsoft Terminal Services......Page 478
10 - Securing IIS......Page 536
11 - Hacking Custom Web Applications......Page 596
12 - Attacking and Defending Microsoft SQL Server......Page 644
13 - Attacking and Defending Oracle......Page 706
14 - Attacking and Defending Unix......Page 754
15 - Wireless LANs: Discovery and Defense......Page 808
16 - Network Architecture......Page 850
17 - Architecting the Human Factor......Page 910
18 - Creating Effective Corporate Security Policies......Page 962
Index......Page 1028

替代描述

24seven is the series for experienced administrators who need to get the most out of their networks, hardware, and software. Starting at the point at which other books and training courses end and the real world begins, the 24seven series delivers a detailed, high-level approach to the information that administrators need to provide their companies with expert services.24seven books are written to build on the knowledge you already have. These books don't waste time covering the basic information you already know or that you can easily figure out on your own. Instead, they focus on the hard-to-find information that will enable you to make informed choices when installing, administering, and troubleshooting hardware and software.

替代描述

Here is the definitive administrator's reference to Exchange Server 5.5, the backbone of NT-based e-mail and groupware solutions. Designed for Exchange administrators who have mastered the basics of Exchange and need to take their knowledge to the next level, this book provides the information needed to improve efficiency, implement effective security, and deliver continuous uptime to the users of their messaging systems. Includes full coverage of migration to Exchange, maintaining and optimizing existing systems, and troubleshooting client and server problems.

替代描述

A successful Exchange 2000 deployment hinges on many elements; these include a strong dependency on Windows 2000 Active Directory (AD), Windows 2000 Internet Information Server (IIS), a properly configures DNS (Domain Name Service) infrastructure, sufficient and reliable hardware, and good operational practices.

替代描述

Contains both hacking techniques, as well as concrete solutions on how to plug the security holes in a Windows 2000 network. This book includes case studies based on the authors' real experiences and also features the trademark "Hacking" series elements, such as attacks, countermeasures, and risk ratings.

替代描述

Analyzes attacks on computer networks, discusses security, auditing, and intrusion detection procedures, and covers hacking on the Internet, attacks against Windows, e-commerce hacking methodologies, and new discovery tools.

替代描述

This edition contains updated hacks and countermeasures throughout, including denial of service attacks, email attacks, viruses and web hacks. It also covers database security, Windows.NET Server, and Novell 5.

开源日期

2009-07-20

Special OPS: Host and Network Security for Microsoft, Unix and Oracle (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 6095

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.