Acknowledgments; A Note to the Reader; Introduction; About the Author; A Historical Synopsis; PART I: THE SEVENTIES; The Beginning of Hacks; PART II: THE EIGHTIES; The Evolution of Hacks; Collected Hacks; Phreaker Philes; Hacker Spies and Virus Hacking; PART III: THE NINETIES; Hacking and Cracking; Phreaking and Virus Hacking; PART IV: THE MILLENNIUM; Hack Progression; Appendix A: Exploits; Appendix B: The TigerTools.net Message Board; Glossary; Index.
JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.
" The author has amassed an enormous amount of material and it is
supplemented by a bound-in CD-ROM in each book." (Software World,
May 2002)
"The author has amassed an enormous amount of material and it is
supplemented by a bound-in CD-ROM in each book." (Software World,
May 2002)
Ask a Question About this Product More... |