Table of Contents
Hacking Exposed—Network Security Secrets & Solutions, Fifth Edition
Foreword Introduction
Part I - Casing the Establishment
Chapter 1 - Footprinting
Chapter 2 - Scanning
Chapter 3 - Enumeration
Part II - System Hacking
Chapter 4 - Hacking Windows
Chapter 5 - Hacking UNIX
Chapter 6 - Remote Connectivity and VoIP Hacking
Part III - Network Hacking
Chapter 7 - Network Devices
Chapter 8 - Wireless Hacking
Chapter 9 - Firewalls
Chapter 10 - Denial of Service Attacks
Part IV - Software Hacking
Chapter 11 - Hacking Code
Chapter 12 - Web Hacking
Chapter 13 - Hacking the Internet User
Part V - Appendixes
Appendix A - Ports
Appendix B - Top 14 Security Vulnerabilities
Index List of Figures
List of Tables
List of Code Listings
List of Sidebars
0 comments:
BONYEZA HAPA KUACHA MAONI YAKO