Security Warrior
By Anton Chuvakin, Cyrus Peikari
By Anton Chuvakin, Cyrus Peikari
Table of Contents
Part I: Software CrackingChapter 1. Assembly Language
Chapter 2. Windows Reverse Engineering
Chapter 3. Linux Reverse Engineering
Chapter 4. Windows CE Reverse Engineering
Chapter 5. Overflow Attacks
Part II: Network Stalking
Chapter 6. TCP/IP Analysis
Chapter 7. Social Engineering
Chapter 8. Reconnaissance
Chapter 9. OS Fingerprinting
Chapter 10. Hiding the Tracks
Part III: Platform Attacks
Chapter 11. Unix Defense
Chapter 12. Unix Attacks
Chapter 13. Windows Client Attacks
Chapter 14. Windows Server Attacks
Chapter 15. SOAP XML Web Services Security
Chapter 16. SQL Injection
Chapter 17. Wireless Security
Part IV: Advanced Defense
Chapter 18. Audit Trail Analysis
Chapter 19. Intrusion Detection Systems
Chapter 20. Honeypots
Chapter 21. Incident Response
Chapter 22. Forensics and Antiforensics
Click Here To Download
0 comments:
Post a Comment