Menu
The Hacker’s Handbook The Strategy behind Breaking into and Defending Networks

The Hacker’s Handbook The Strategy behind Breaking into and Defending Networks

Categories crc , hacking
Description Download Report
quang cao

Every book, as they say, has a story. This book’s history has been a long and varied one. Along the way, numerous individuals have contributed their time, focus, energy, technical acumen, or moral support to seeing The Hacker’s Handbook through to its conclusion.

The Hacker’s Handbook The Strategy behind Breaking into and Defending Networks

The authors would like to thank the following individuals for their contributions and support:

  •  Rich O’Hanley and the production staff at Auerbach Press for their tireless support of this book, in spite of its long (and somewhat nefarious) history.
  •  Our contributing authors — Felix Lindner, Jim Barrett, Scott Brown, and John Zuena — for taking the time and care to write several excellent chapters on the hacking community, malware, directory services, and network hardware that contain some truly unique and interesting material.
  • Our technical reviewers, including Jim Tiller, Anton Chuvakin, Sean Cemm, Ben Rothke, and Ted Shagory, for their insights and for dedicating their time and energy to helping to shape a better book.

We are confident that this review process will continue as this text goes to publication, and want — in advance — to thank our readers and reviewers for their attention to the ongoing quality of this book.

In addition, Dave Aitel would like to thank Justine Bone for her support and encouragement and Susan Young would like to thank the following individuals: the Darklord (Thomas McGinn) for keeping his personal commitment to support the effort that went into this book in spite of many months of spent deadlines, missed weekends, and fatigue (thanks, T2B); Trevor Young, for lending his genuine talent, enthusiasm, time, and care to crafting the illustrations throughout this book; Gemma Young, and her parents, Sylvia and Neil, for their interest, support, and advice through two years of long distance phone calls; and International Network Services (and particularly Steven Marandola, Bob Breingan, and Shaun Meaney) for making available time and support for the completion of this book.

Newer Home Older