Chained Exploits: Advanced Hacking Attacks from Start to Finish

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp
  Channel
 Data Warehouse Sql Language
 ACCESS FileMaker
 Data Mining Database Design
 Database General MySql
 Oracle SQL Server 2005
 SQL Server 2008 DB2
 Sql Server Windows 2003
 Windows Server 2008 Linux
 Windows Unix
 Windows Vista OS General
 Flash Flex
 3D Animation PhotoShop
 SCM Project
 Software Test Object Oriented
 MDA CMM CMMI ISO
 UML Service Oriented
 Patterns Extreme Programming
 Requirement Aspect Oriented
 Six Sigma Excel
 SAP Google
 Apple Exchange Server
 VPN Wireless
 IPv6 VoIP
 Mobile C C++
 Spring Ado.Net
 Programming General Dot Net
 COM DCOM Vb Vb.Net
 C# CSharp Hibernate
 Java Delphi
 Eclipse Swing
 J2ME DirectX
 Algorithms OpenGL
 Visual Studio Web Services
 J2EE Crystal Reports
 JDBC WebLogic
 Grid Computing WPF
 Jakarta DreamWeaver
 Apache Asp
 Web Design Adobe AIR
 Web General Asp.Net
 HTML JSP
 Java Script SharePoint
 VBScript Ajax
 Python Ruby
 Perl CSS
 XML XSLT PHP
 Game Programming Game General
 
Chained Exploits: Advanced Hacking Attacks from Start to Finish
[LanguageEnglish ] [Channel: Security ] 
<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
The complete guide to todays hard-to-defend chained attacks: performing them and preventing them
Nowadays, its rare for malicious hackers to rely on just one exploit or tool; instead, they use chained exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most dont cover them at all. Now theres a book that brings together start-to-finish information about todays most widespread chained exploitsCboth how to perform them and how to prevent them.
Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use todays most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.
Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce todays most effective countermeasures both technical and human. Coverage includes:
*Constructing convincing new phishing attacks
*Discovering which sites other Web users are visiting
*Wreaking havoc on IT security via wireless networks
*Disrupting competitors Web sites
*PerformingCand preventingCcorporate espionage
*Destroying secure files
*Gaining access to private healthcare records
*Attacking the viewers of social networking pages
*Creating entirely new exploits

http://rapidshare.com/files/228528426/032149881X.rar
http://depositfiles.com/files/x1wvp484x
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值