/ Books / Subjects / Computers & Technology / Certification / CompTIA

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (The Radia Perlman Series in Computer Networking and Security)

by Edward Skoudis

ISBN: 9780130332738 / 0130332739

Loading offers...

Buy on Amazon
Product Description

This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools, and proven, step-by-step countermeasures. Skoudis begins by presenting the hacker's view of networks and their vulnerabilities, with especially detailed coverage of how hackers view the TCP/IP protocol suite. He introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for network vulnerabilities; gaining access and exploiting the system; maintaining access; and preventing detection. Counter Hack presents in-depth descriptions of the most widespread and dangerous attack scenarios, and the most widely-used hacker tools, including war dialers, port scanners, firewall scanners, sniffers, session hijackers, and more. For all system administrators, network administrators, security specialists, and others directly involved in protecting network and computing infrastructure.

Amazon.com Review

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.

The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall

Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defenses. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes, and details a modus operandi that's typical of the bad guys.

ISBN 13 978-01-30332-73-8
ISBN 10 0-130-33273-9
ASIN 0130332739
  • 0076092013426
  • 9780130332738
  • 076092013426
Amazon Sales Rank 164,629
Main Category Paperback
Group Book
Publisher Prentice Hall PTR
Studio Prentice Hall PTR
Manufacturer Prentice Hall PTR
Package Quantity 1
Count Per Package 1
Dimensions 7.05 x 1.56 x 9.26 inches. 2.5 pounds
Package Dimensions 9.2 x 7 x 1.7 inches. 2.5 pounds
Language(s) English (Published)
English (Original Language)
English (Unknown)
Adult Product? No

Similar Products


Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)


Internet Site Security


Malware: Fighting Malicious Code


Loading reviews...

Best Sellers



CompTIA Product Reviews Compare Product Reviews on CompTIACompare Prices on CompTIA CompTIA Price Comparison Compare Product Reviews on Networking Networking Product ReviewsCompare Prices on Networking Networking Price Comparison Hacking Price Comparison Hacking Product ReviewsCompare Prices on Hacking Compare Product Reviews on Hacking Groupware Compare Product Reviews on Internet & Telecommunications InternetCompare Prices on Internet Groupware Groupware & Telecommunications Internet & Telecommunications Product Reviews Groupware & Telecommunications Price Comparison Networks Product ReviewsCompare Prices on Networks Networks Price Comparison Compare Product Reviews on Networks Compare Product Reviews on PerlCompare Prices on Perl Perl Product Reviews Perl Price Comparison Compare Product Reviews on Privacy & Online Safety Privacy & Online Safety Price Comparison Privacy & Online Safety Product ReviewsCompare Prices on Privacy & Online Safety