A Hacker's Guide to Protecting Your Internet Site and Network
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network and work toward a solution to those problems.
Explores the most commonly used hacking techniques so users can safeguard their system
Covers all computing platforms
Includes step-by-step lists and discussions of the vulnerabilities inherent in each operating system on the market
Books can be attributed to "Anonymous" for several reasons:
* They are officially published under that name * They are traditional stories not attributed to a specific author * They are religious texts not generally attributed to a specific author
Books whose authorship is merely uncertain should be attributed to Unknown.