What is included with this book?
Widely recognized for his extensive and in-depth knowledge of security products, Stuart is considered one of the industry's leading authorities in information security today. A published and acclaimed security visionary, he brings many years of technology and executive leadership to McAfee Foundstone, along with profound technical, operational, and financial experience. At Foundstone, Stuart leads both product vision and strategy, and holds operational responsibilities for all technology development, support, and implementation. During his tenure, annual revenues grew over 100 percent every year since the company's inception in 1999.
In 1999, he took the lead in authoring Hacking Exposed: Network Security Secrets & Solutions, the best-selling computer-security book ever, with over 500,000 copies sold to date. Stuart also coauthored Hacking Exposed: WIndows 2000 (McGraw-Hill/Osborne, 2001) and Web Hacking: Attacks and Defense (Addison-Wesley, 2002).
Prior to Foundstone, Stuart held a variety of leadership positions in security and IT management, with Ernst & Young's National Security Profiling Team, two years as an industry analyst with InfoWorld's Test Center, five years as director of IT with both state and local California governments, two years as owner of an IT consultancy, and two years in IT with the University of Colorado, Boulder.
Stuary holds a bachelor's degree in psychology and philosophy, with an emphasis in computer science applications, from the University of Colorado, Boulder. He later earned numerous ceritifications, including ISC2's CISSP, Novell's CNE, and Check Point's CCSE.
Joel Scambray (Woodinville, WA) is Senior Director of Security for Microsoft's MSN.
George Kurtz (Conto de Caza, CA) is Senior Vice President of Risk Managemnt for McAfee.
They are all best-selling authors of all four previous editions of Hacking Exposed. McClure and Scambray also co-authored Hacking Exposed Windows 2000 and Hacking Exposed Windows Server 2003. Scambray co-authored Hacking Exposed Web Applications and Kurtz contributed to Hacking Exposed Linux.
Foreword | xvii | ||||
Acknowledgments | xix | ||||
Introduction | xxi | ||||
|
|||||
|
2 | (3) | |||
|
5 | (36) | |||
|
6 | (2) | |||
|
6 | (2) | |||
|
8 | (32) | |||
|
8 | (1) | |||
|
8 | (1) | |||
|
8 | (10) | |||
|
18 | (14) | |||
|
32 | (5) | |||
|
37 | (3) | |||
|
40 | (1) | |||
|
41 | (36) | |||
|
42 | (9) | |||
|
51 | (17) | |||
|
52 | (2) | |||
|
54 | (6) | |||
|
60 | (6) | |||
|
66 | (2) | |||
|
68 | (8) | |||
|
69 | (4) | |||
|
73 | (3) | |||
|
76 | (1) | |||
|
77 | (62) | |||
|
79 | (2) | |||
|
81 | (52) | |||
|
133 | (3) | |||
|
|||||
|
136 | (3) | |||
|
139 | (72) | |||
|
141 | (1) | |||
|
142 | (1) | |||
|
142 | (31) | |||
|
143 | (22) | |||
|
165 | (8) | |||
|
173 | (26) | |||
|
173 | (2) | |||
|
175 | (11) | |||
|
186 | (4) | |||
|
190 | (2) | |||
|
192 | (4) | |||
|
196 | (3) | |||
|
199 | (10) | |||
|
199 | (1) | |||
|
200 | (2) | |||
|
202 | (1) | |||
|
203 | (1) | |||
|
204 | (1) | |||
|
205 | (1) | |||
|
205 | (1) | |||
|
206 | (2) | |||
|
208 | (1) | |||
|
209 | (2) | |||
|
211 | (82) | |||
|
212 | (1) | |||
|
212 | (1) | |||
|
213 | (1) | |||
|
213 | (1) | |||
|
214 | (47) | |||
|
218 | (12) | |||
|
230 | (5) | |||
|
235 | (26) | |||
|
261 | (15) | |||
|
276 | (14) | |||
|
289 | (1) | |||
|
290 | (3) | |||
|
293 | (58) | |||
|
294 | (2) | |||
|
296 | (17) | |||
|
296 | (1) | |||
|
297 | (1) | |||
|
298 | (1) | |||
|
298 | (15) | |||
|
313 | (12) | |||
|
325 | (4) | |||
|
329 | (6) | |||
|
335 | (4) | |||
|
339 | (6) | |||
|
340 | (5) | |||
|
345 | (3) | |||
|
|||||
|
348 | (3) | |||
|
351 | (56) | |||
|
352 | (4) | |||
|
352 | (4) | |||
|
356 | (3) | |||
|
357 | (1) | |||
|
357 | (1) | |||
|
358 | (1) | |||
|
359 | (1) | |||
|
360 | (5) | |||
|
365 | (40) | |||
|
366 | (2) | |||
|
368 | (1) | |||
|
369 | (12) | |||
|
381 | (2) | |||
|
383 | (3) | |||
|
386 | (7) | |||
|
393 | (11) | |||
|
404 | (1) | |||
|
405 | (2) | |||
|
407 | (56) | |||
|
408 | (17) | |||
|
409 | (16) | |||
|
425 | (12) | |||
|
426 | (4) | |||
|
430 | (7) | |||
|
437 | (5) | |||
|
438 | (2) | |||
|
440 | (2) | |||
|
442 | (6) | |||
|
444 | (2) | |||
|
446 | (1) | |||
|
447 | (1) | |||
|
448 | (5) | |||
|
453 | (3) | |||
|
456 | (1) | |||
|
457 | (1) | |||
|
458 | (2) | |||
|
460 | (3) | |||
|
463 | (24) | |||
|
464 | (1) | |||
|
465 | (7) | |||
|
469 | (3) | |||
|
472 | (5) | |||
|
477 | (3) | |||
|
480 | (4) | |||
|
482 | (2) | |||
|
484 | (3) | |||
|
487 | (24) | |||
|
489 | (9) | |||
|
490 | (1) | |||
|
491 | (7) | |||
|
498 | (9) | |||
|
498 | (1) | |||
|
499 | (4) | |||
|
503 | (1) | |||
|
504 | (3) | |||
|
507 | (3) | |||
|
|||||
|
510 | (1) | |||
|
511 | (24) | |||
|
512 | (11) | |||
|
512 | (6) | |||
|
518 | (5) | |||
|
523 | (11) | |||
|
523 | (1) | |||
|
524 | (8) | |||
|
532 | (1) | |||
|
533 | (1) | |||
|
534 | (1) | |||
|
535 | (38) | |||
|
536 | (10) | |||
|
538 | (1) | |||
|
539 | (1) | |||
|
539 | (1) | |||
|
540 | (2) | |||
|
542 | (2) | |||
|
544 | (2) | |||
|
546 | (26) | |||
|
546 | (1) | |||
|
547 | (2) | |||
|
549 | (12) | |||
|
561 | (11) | |||
|
572 | (1) | |||
|
573 | (86) | |||
|
574 | (49) | |||
|
575 | (4) | |||
|
579 | (1) | |||
|
580 | (1) | |||
|
581 | (1) | |||
|
582 | (1) | |||
|
583 | (3) | |||
|
586 | (1) | |||
|
587 | (4) | |||
|
591 | (1) | |||
|
592 | (8) | |||
|
600 | (13) | |||
|
613 | (2) | |||
|
615 | (4) | |||
|
619 | (4) | |||
|
623 | (5) | |||
|
624 | (4) | |||
|
628 | (6) | |||
|
629 | (1) | |||
|
630 | (4) | |||
|
634 | (12) | |||
|
634 | (8) | |||
|
642 | (4) | |||
|
646 | (1) | |||
|
647 | (4) | |||
|
|||||
|
651 | (6) | |||
|
657 | (2) | |||
Index | 659 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.