From the Back Cover
"A must-read for anyone in security�. One of the best security books available." . --Tony Bradley, CISSP, About.com.
"Authoritative�.Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee.
"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times.
"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." �Bill Machrone, PC Magazine.
"With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." �Mirko Zorz, Net-security.org.
The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. .
. New and Updated Material:.
- New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them.
- New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits.
- Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures.
- Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners.
- New content on remote connectivity including VoIP hacking.
- New coverage of web and e-mail client hacking, including the latest Internet
- Explorer exploits, phishing, spyware, rootkits, and bots.
- New hacks and countermeasures using Google as a reconnaissance tool.
- An updated footprinting chapter that deals with changes regarding finding information from Internet databases.
- Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks
About the Author
. Widely recognized for his extensive and in-depth knowledge of security products, Stuart is considered one of the industry's leading authorities in information security today. A published and acclaimed security visionary, he brings many years of technology and executive leadership to McAfee Foundstone, along with profound technical, operational, and financial experience. At Foundstone, Stuart leads both product vision and strategy, and holds operational responsibilities for all technology development, support, and implementation. During his tenure, annual revenues grew over 100 percent every year since the company's inception in 1999..
. In 1999, he took the lead in authoring Hacking Exposed: Network Security Secrets And Solutions, the best-selling computer-security book ever, with over 500,000 copies sold to date. Stuart also coauthored Hacking Exposed: WIndows 2000 (McGraw-Hill/Osborne, 2001) and Web Hacking: Attacks and Defense (Addison-Wesley, 2002)..
. Prior to Foundstone, Stuart held a variety of leadership positions in security and IT management, with Ernst And Young's National Security Profiling Team, two years as an industry analyst with InfoWorld's Test Center, five years as director of IT with both state and local California governments, two years as owner of an IT consultancy, and two years in IT with the University of Colorado, Boulder..
. Stuary holds a bachelor's degree in psychology and philosophy, with an emphasis in computer science applications, from the University of Colorado, Boulder. He later earned numerous ceritifications, including ISC2's CISSP, Novell's CNE, and Check Point's CCSE..
. Joel Scambray (Woodinville, WA) is Senior Director of Security for Microsoft's MSN..
. George Kurtz (Conto de Caza, CA) is Senior Vice President of Risk Managemnt for McAfee.
. They are all best-selling authors of all four previous editions of Hacking Exposed. McClure and Scambray also co-authored Hacking Exposed Windows 2000 and Hacking Exposed Windows Server 2003. Scambray co-authored Hacking Exposed Web Applications and Kurtz contributed to Hacking Exposed Linux..