Linux Central cd-roms Commercial Linux distributions and software Linux books Linux games! Serial display modules Cool Linux gear!
Linux Central home page
--- Product Finder: ---
name:
AND OR

manufacturer:
processor platform:
Product catalog
Linux Central CD-ROMs
Commercial Linux Distributions
Linux Applications and Software
Linux Books
Technical Books
Serial Display Modules
Bootable Network Cards
Keyboards
Linux Gear
Training and Certification
Service
Service
Policies
FAQs
Shipping & Handling Options
About Linux Central
Contact us
Link us

[view your shopping cart]
 / root / Linux Books / Security
product shot
Security Warrior
stock:
in stock
ships in:
24 hrs.
release date:
January 2004
list price:
$44.95
our price:
$31.95
you save:
29%
[order]
status: current
Author(s): Cyrus Peikara, Anton Chuvakin
language: English
pages: 531
ISBN: 0596005458
related links
Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
product description

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.


related links
manufacturer website
websiteoptimization.com


  product contents
Book
back to top