Hack Attacks Encyclopedia
By

Rating

Product Description
Product Details

Table of Contents

Acknowledgments; A Note to the Reader; Introduction; About the Author; A Historical Synopsis; PART I: THE SEVENTIES; The Beginning of Hacks; PART II: THE EIGHTIES; The Evolution of Hacks; Collected Hacks; Phreaker Philes; Hacker Spies and Virus Hacking; PART III: THE NINETIES; Hacking and Cracking; Phreaking and Virus Hacking; PART IV: THE MILLENNIUM; Hack Progression; Appendix A: Exploits; Appendix B: The TigerTools.net Message Board; Glossary; Index.

About the Author

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Reviews

" The author has amassed an enormous amount of material and it is supplemented by a bound-in CD-ROM in each book." (Software World, May 2002)

"The author has amassed an enormous amount of material and it is supplemented by a bound-in CD-ROM in each book." (Software World, May 2002)

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
Home » Books » Computers » Security
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top