英文 [en], .pdf, 🚀/lgli/lgrs/nexusstc/upload/zlib, 17.8MB, 📘 書籍(非小說), upload/wll/ENTER/Science/IT & AI/IT Library/Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf
描述
"Special Ops is an adrenaline-pumping tour of the most critical security weaknesses present on most any corporate network today...-Joel Scambray, Senior Director, Microsoft's MSN, and Co-Author, Hacking Exposed Fourth Edition, Windows 2000, and Web Hacking Editions"Special Ops has brought some of the best speakers and researchers of computer security together to cover what you need to know to survive in today's net.-Jeff Moss, President & CEO, Black Hat, Inc.Special Ops brings perspective from today's best computer security minds into a single, enormously informative book. -Mike Schiffman, Director of Security Architecture, @stake, Inc., and Author of Building Open Source Network Security Tools and The Hacker's Challenge SeriesSpecial Ops: Host and Network Security for Microsoft, UNIX, and Oracle provides solutions for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? Have you considered the damage that could be done by recently laid-off or disgruntled employees, contractors and consultants, building security guards, cleaning staff, and of course the unsecured wireless network? This is the one book you need to defend the soft, chewy center of internal networks.
替代文件名
lgrsnf/dvd37/Birkholz E., Burnett M. - Special OPS. Host and Network Security for Microsoft, Unix and Oracle(2003)(784).pdf
替代文件名
lgli/dvd37/Birkholz E., Burnett M. - Special OPS. Host and Network Security for Microsoft, Unix and Oracle(2003)(784).pdf
替代文件名
nexusstc/Special OPS: Host and Network Security for Microsoft, Unix and Oracle/2a6d4740f27fc418768224d36ee6d4d0.pdf
替代标题
Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)
替代标题
Hacking exposed Windows 2000 : network security, secrets & [and] solutions
替代标题
Exchange server 5.5: Проблемы и решения
替代标题
Windows 2000 (Hacking Exposed)
替代标题
Exchange Server 5.5 : 24 seven
替代标题
Exchange 2000 server : 24seven
替代标题
Exchange Server 2000 24seven
替代标题
Hacking Windows 2000 exposed
替代作者
McClure, Stuart, Scambray, Joel, Kurtz, George
替代作者
Stuart McClure, Joel Scambray, George Kurtz
替代作者
Scambray, Joel, McClure, Stuart
替代作者
Joel Scambary
替代作者
Макби, Джим
替代作者
McBee, Jim
替代作者
Jim MacBee
替代作者
Джим Макби
替代出版社
McGraw-Hill School Education Group
替代出版社
John Wiley & Sons, Incorporated
替代出版社
Irwin Professional Publishing
替代出版社
McGraw-Hill Osborne Media
替代出版社
Computing Mcgraw-Hill
替代出版社
Osborne/McGraw-Hill
替代出版社
Sybex/Network Press
替代出版社
Osborne McGraw-Hill
替代出版社
Sybex, Incorporated
替代出版社
Oracle Press
替代出版社
Питер
替代版次
John Wiley & Sons, Inc. (trade), Alameda, Calif, 2002
替代版次
24seven, San Francisco, London, California, 2002
替代版次
Для профессионалов, СПб. и др, Russia, 2000
替代版次
4th ed, Berkeley Calif. ; London, ©2003
替代版次
United States, United States of America
替代版次
San Francisco, California, 1999
替代版次
New York, New York State, 2001
替代版次
1st edition, November 15, 2001
替代版次
24seven, Alameda, Calif, ©2002
替代版次
24seven, San Francisco, ©1999
替代版次
4 edition, February 25, 2003
替代版次
4th edition, New York, 2003
替代版次
4th ed, New York, cop. 2003
替代版次
San Francisco, Calif, 2001
替代版次
San Francisco, cop. 1999
替代版次
First Edition, PT, 2001
替代版次
Berkeley, Calif, ©2001
替代版次
Berkeley, 1983
替代版次
1, US, 2001
替代版次
1, PS, 1999
元数据评论
mexmat -- 37
元数据评论
lg54322
元数据评论
producers:
Acrobat Distiller 4.0 for Macintosh
元数据评论
{"edition":"1","isbns":["0072192623","0072227427","0782125050","0782127975","9780072192629","9780072227420","9780782125054","9780782127973"],"last_page":1042,"publisher":"McGraw-Hill Companies","series":"Hacking Exposed"}
元数据评论
Includes index.
元数据评论
Доп. тит. л. изд.: San Francisco, etc, англ.
На тит. л. в вых. дан.: Санкт-Петербург, Москва, Харьков, Минск
Указ.
元数据评论
РГБ
元数据评论
Russian State Library [rgb] MARC:
=001 000657050
=003 RuMoRGB
=005 20020129120000.0
=008 000629s2000\\\\ru\||||\|\\\\\|01\u\rus\d
=017 \\ $a 00-24986 $b РКП
=020 \\ $a 5-272-00066-8
=020 \\ $a 0-7821-2505-0 (англ.)
=035 \\ $a (RuMoRGB)KNO-0107110
=040 \\ $a RuMoRGB $b rus $c RuMoRGB
=041 0\ $a rus
=084 \\ $a З973.233.02-018.2,07 $2 rubbk
=100 1\ $a Макби, Джим
=245 00 $a Exchange server 5.5 : $b Проблемы и решения $c Джим Макби
=260 \\ $a СПб. и др. $b Питер $c 2000
=300 \\ $a 621 с. $b ил. $c 24 см
=440 \0 $a Для профессионалов
=500 \\ $a Доп. тит. л. изд.: San Francisco, etc, англ.
=500 \\ $a На тит. л. в вых. дан.: Санкт-Петербург, Москва, Харьков, Минск
=555 \\ $a Указ.
=650 \7 $a Информационные системы и сети -- Операционные системы -- Пособие для специалистов $2 rubbk
=852 \\ $a РГБ $b FB $j 3 00-20/61-2 $x 90
=852 \\ $a РГБ $b FB $j 3 00-20/62-0 $x 90
替代描述
From the best-selling co-authors of the world-renowned book,Hacking Exposed,comes Hacking Windows 2000 Exposed. You'll learn,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption,domain control,Web and IIS 5 communications,LM/NTLM protocols,Active Directory,NetBIOS services,and much more. <p>Learn how to secure Windows 2000 from the hacker's perspective Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins,fraud,sabotage,and DoS downtime are constant realities in this target-rich environment. <b>Hacking Exposed Windows 2000: Network Security Secrets ; Solutions</b> will teach you,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks,from the mundane to the sophisticated,and detailed countermeasures to protect against them.</p><p>What You'll Learn:</p><ul><li>The proven Hacking Exposed methodology to locate,exploit,and patch vulnerable systems</li><li>How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!)</li><li>How to implement and proactively prevent the newest IIS 5 hacks,including remote buffer overflow attacks,the Code Red Worm,file system traversal,and source code disclosure</li><li>SQL and Terminal Server penetration and defense</li><li>Bypassing Windows 2000 IPSec filters and defeatingthe Encrypting File System</li><li>Using privilege escalation exploits to run code as SYSTEM</li><li>Active Directory and SNMP exploitation</li><li>How attackers extract password hashes,crack them,and install remote control back doors</li><li>Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls</li><li>Debilitating Denial of Service attacks</li><li>Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences</li><li>How to use built-in Windows 2000 technologies like IPSec,Kerberos,Group Policy,Security Templates and Security Configuration and Analysis like the experts to keep you systems secure</li><li>What the new generation of Windows portends for security,including analyses of Windows XP and Windows. NET Server,code named Whistler</li></ul> <p>From the best-selling co-authors of the world-renowned book, <i>Hacking Exposed</i>, comes <i>Hacking Windows 2000 Exposed</i>. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.</p>
替代描述
<i>"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure."</i> --Bill Machrone, PC Magazine
<p>This brand-new edition of the best-selling security book covers all the latest hacks and countermeasures and includes a bonus DVD with the authors' famous "Hacking Exposed Live" presentation!</p>
<p>Stuart McClure is the coauthor of all four editions of <i>Hacking Exposed</i> as well as of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072192623"><i>Hacking Exposed Windows 2000</i></a>. Stuart co-authored "Security Watch," a weekly column in InfoWorld addressing topical security issues, exploits, and vulnerabilities. He is the President/CTO of Foundstone, Inc. Prior to co-founding Foundstone, Stuart was a Senior Manager with Ernst & Young's Security Profiling Services Group, responsible for project management, attack and penetration reviews, and technology evaluations. Stuart trains Foundstone's Ultimate Hacking course, and Hacking Exposed Live for conferences such as Networld + InterOp, Black Hat, RSA, CSI, among others.</p>
<p>Joel Scambray, CISSP, is the co-author of all four editions of <i>Hacking Exposed</i> as well as of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=007222438X"><i>Hacking Exposed Web Applications</i></a> and <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072192623"><i>Hacking Exposed Windows 2000</i></a>. Joel co-authored "Security Watch," a weekly column in InfoWorld. Joel is the author of Microsoft's "Ask Us About ... Security" Monthly Column. He also taught Foundstone's Ultimate Hacking Windows course.</p>
<p>George Kurtz, CISSP, is the co-author of all four editions of <i>Hacking Exposed</i> and of both editions of <a href="http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?isbn=0072225645"><i>Hacking Linux Exposed.</i></a> He is the CEO of Foundstone, a cutting edge security solutions provider. Mr. Kurtz has significant experience with intrusion detection and firewall technologies, incident response procedures, and remote access solutions. As CEO and co-founder of Foundstone, George provides a unique combination of business acumen and technical security know-how.</p>
替代描述
<p><b>For experienced Exchange Server administrators.</b> At last, here's the book that you and other Exchange Server administrators have been waiting for. Starting where other books and training courses end and the real world begins, Exchange 2000 Server 24seven provides the detailed information that will make you a true expert.</p><p><b>Written to build on the knowledge you already have.</b> Inside, Exchange Server expert Jim McBee delivers the targeted instruction and inside tips you need to get the most out of your Exchange Server implementation. Coverage includes:</p><ul><li>Managing Exchange 2000 features in Active Directory</li><li>Choosing the correct approach to migration</li><li>Restricting server access</li><li>Scaling Exchange Server to meet your organization's needs</li><li>Detecting problems affecting uptime and mail delivery</li><li>Performing backup and disaster recovery procedures</li><li>Managing Exchange 2000 database operations</li><li>Implementing an Exchange 2000 cluster</li><li>Creating a public folder infrastructure</li><li>Understanding message routing and designing routing groups</li><li>Implementing and troubleshooting Internet clients</li></ul><p class=null1>24seven: The Advanced Information You Can't Find Anywhere Else</p><p class=null1>Other books in the series include:</p><ul><li>Firewalls 24seven</li><li>Windows 2000 24seven</li><li>Cisco Routers 24seven</li><li>TCP/IP 24seven</li></ul><p>Keep your systems and networks up and running 24 hours a day, 7 days a week, 52 weeks a year, with the 24seven series from Sybex.</p> <p>This guide to Exchange 2000 Server covers issues such as integrating migration, backup and recovery, streamlining daily maintenance, client and server automation, and securing servers against attack.</p>
替代描述
For experienced Exchange Server administrators. At last, here's the book that you and other Exchange Server administrators have been waiting for. Starting where other books and training courses end and the real world begins, Exchange 2000 Server 24seven provides the detailed information that will make you a true expert. Written to build on the knowledge you already have. Inside, Exchange Server expert Jim McBee delivers the targeted instruction and inside tips you need to get the most out of your Exchange Server implementation. Coverage includes: Managing Exchange 2000 features in Active Directory Choosing the correct approach to migration Restricting server access Scaling Exchange Server to meet your organization's needs Detecting problems affecting uptime and mail delivery Performing backup and disaster recovery procedures Managing Exchange 2000 database operations Implementing an Exchange 2000 cluster Creating a public folder infrastructure Understanding message routing and designing routing groups Implementing and troubleshooting Internet clients 24seven: The Advanced Information You Can't Find Anywhere Else Other books in the series include: Firewalls 24seven Windows 2000 24seven Cisco Routers 24seven TCP/IP 24seven Keep your systems and networks up and running 24 hours a day, 7 days a week, 52 weeks a year, with the 24seven series from Sybex.
替代描述
Cover......Page 1
Contents......Page 14
1 - Assessing Internal Network Security......Page 26
2 - Inventory and Exposure of Corporate Assets......Page 46
3 - Hunting for High Severity Vulnerabilities (HSV)......Page 74
4 - Attacking and Defending Windows XP Professional......Page 110
5 - Attacking and Defending Windows 2000......Page 196
6 - Securing Active Directory......Page 268
7 - Securing Exchange and Outlook Web Access......Page 328
8 - Attacking and Defending DNS......Page 418
9 - Attacking and Defending Microsoft Terminal Services......Page 478
10 - Securing IIS......Page 536
11 - Hacking Custom Web Applications......Page 596
12 - Attacking and Defending Microsoft SQL Server......Page 644
13 - Attacking and Defending Oracle......Page 706
14 - Attacking and Defending Unix......Page 754
15 - Wireless LANs: Discovery and Defense......Page 808
16 - Network Architecture......Page 850
17 - Architecting the Human Factor......Page 910
18 - Creating Effective Corporate Security Policies......Page 962
Index......Page 1028
替代描述
24seven is the series for experienced administrators who need to get the most out of their networks, hardware, and software. Starting at the point at which other books and training courses end and the real world begins, the 24seven series delivers a detailed, high-level approach to the information that administrators need to provide their companies with expert services.24seven books are written to build on the knowledge you already have. These books don't waste time covering the basic information you already know or that you can easily figure out on your own. Instead, they focus on the hard-to-find information that will enable you to make informed choices when installing, administering, and troubleshooting hardware and software.
替代描述
Here is the definitive administrator's reference to Exchange Server 5.5, the backbone of NT-based e-mail and groupware solutions. Designed for Exchange administrators who have mastered the basics of Exchange and need to take their knowledge to the next level, this book provides the information needed to improve efficiency, implement effective security, and deliver continuous uptime to the users of their messaging systems. Includes full coverage of migration to Exchange, maintaining and optimizing existing systems, and troubleshooting client and server problems.
替代描述
A successful Exchange 2000 deployment hinges on many elements; these include a strong dependency on Windows 2000 Active Directory (AD), Windows 2000 Internet Information Server (IIS), a properly configures DNS (Domain Name Service) infrastructure, sufficient and reliable hardware, and good operational practices.
替代描述
Contains both hacking techniques, as well as concrete solutions on how to plug the security holes in a Windows 2000 network. This book includes case studies based on the authors' real experiences and also features the trademark "Hacking" series elements, such as attacks, countermeasures, and risk ratings.
替代描述
Analyzes attacks on computer networks, discusses security, auditing, and intrusion detection procedures, and covers hacking on the Internet, attacks against Windows, e-commerce hacking methodologies, and new discovery tools.
替代描述
This edition contains updated hacks and countermeasures throughout, including denial of service attacks, email attacks, viruses and web hacks. It also covers database security, Windows.NET Server, and Novell 5.
开源日期
2009-07-20