Libros de Seguridad Informática y Defensa contra Hackers:
Si no encuentras aquí el libro que buscas regresa a la
página principal de Libros
y utiliza los buscadores separados por país.
Seguridad y Antivirus con CD-ROM: Dr. Max, en Espanol / Spanish
Tomas Coste, MP Ediciones
Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition
Stuart McClure, Joel Scambray, George Kurtz
Security vulnerabilities of operating systems, applications, and network devices
Administrative procedures that will help defeat them.
Hacking Exposed Linux, 2nd Edition
Brian Hatch, James Lee
"Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Hacking Linux Exposed helps you answer that question and solve many of the security problems you find. To a certain extent this book is a recipe collection in that it describes weaknesses in Linux (calling attention to specific distributions where appropriate). The authors stop short of explicitly showing you how to wage most kinds of attacks, a reasonable thing to do from an ethical point of view even though the instructions can be found easily on the Internet. Rather than do that, they give step-by-step instructions on how to defend against the attacks they catalog. The point is not, "Here's precisely how to bring down a server by means of an ACK storm," but rather, "Here's how to defend against such problems." They do demonstrate plenty of weaknesses, though, as in their coverage of the conversation that goes back and forth between an FTP server and its client.
This book covers pretty much everything you'd want to do with a Linux machine as a network server. Read it and see some of the weaknesses in your system--and do something about them before someone else does. --David Wall
Topics covered: Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling.
Hacking Exposed Windows Server 2003
Joel Scambray, Stuart McClure
The end-all of hacking.... A must-read if you want to secure your networks." --W2Knews
Plug the holes in your Windows infrastructure by seeing it through the eyes of the attacker
Protect your Windows Server 2003 systems from the latest widespread and devastating attacks the tried-and-true Hacking Exposed way. You'll learn, step-by-step, how intruders locate targets, gain super-user access, and ransack compromised networks. Fully updated chapters detail all-new Windows Server 2003 footprinting and scanning methods, IIS6 security flaws, buffer overflow exploits, Terminal Services hacks, and DoS/DDoS vulnerabilities. Real-world cases and code examples demonstrate the most current dangers and spell out countermeasures to stonewall malicious intruders every time.
New and Updated Material:
All-new Windows footprinting and scanning tools and techniques
NetBIOS, MSRPC, SMB, DNS, SNMP, and Active Directory enumeration protection
Updated exploits of Windows-specific services, including the MSRPC interface vulnerability that led to the Blaster worm, SQL Slammer, and eavesdropping attacks on Kerberos
Details on the new IIS6 security architecture, URLScan, Microsoft Web services source code disclosure exploits, and HTR chunked encoding exploits
All-new Terminal Services information including new password guessing, privilege escalation, and eavesdropping countermeasures
New client-side exploits using popular multimedia file formats, and strong new countermeasures using Internet Explorer Enhanced Security Configuration
The latest countermeasures for Denial of Service (DoS) attacks including bogon filtering and sink holes
New security features such as Internet Connection Firewall, software restriction policies, and updates to IPSec
Inside Internet Security:
What Hackers Don't Want You To Know
by Jeff Crume
Hackers know things that you don't. That's their edge.
It's the reason that they are able to break into networks, leaving a path of destruction in their wake. This book discusses some of the tricks of the hacker trade -- things that are well known in the hacker community but all too foreign to the I/T support staff. The intention is to dispel some of the common myths and misconceptions surrounding computer network security which lead to vulnerabilities that hackers can exploit. Techniques and tools for defending against such attacks are also discussed.