通常配送無料 詳細
通常1~3か月以内に発送します。 在庫状況について
この商品は、Amazon.co.jp が販売、発送します。 ギフトラッピングを利用できます。

お届け先住所
アドレス帳を使用するにはサインインしてください
または
-
正しい郵便番号を入力してください。
または
+ ¥ 257 関東への配送料
中古品: 良い | 詳細
発売元 worldbooksjapan
コンディション: 中古品: 良い
コメント: イギリスより発送。通常7-21日以内にお手元に。日本語でも対応しております。 Book is shipped from UK, please allow up to 21 days for delivery.
この商品をお持ちですか? マーケットプレイスに出品する
裏表紙を表示 表紙を表示
サンプルを聴く 再生中... 一時停止   Audible オーディオエディションのサンプルをお聴きいただいています。
2点すべてのイメージを見る

Security Warrior (英語) ペーパーバック – 2004/2


その他(2)の形式およびエディションを表示する 他のフォーマットおよびエディションを非表示にする
Amazon 価格
新品 中古品
Kindle版
"もう一度試してください。"
ペーパーバック
"もう一度試してください。"
¥ 5,408
¥ 5,149 ¥ 743
この商品の特別キャンペーン 本とのまとめ買いで対象商品が10%OFF 1 件


AmazonStudent

Amazon Student会員なら、この商品は+10%Amazonポイント還元(Amazonマーケットプレイスでのご注文は対象外)。

click to open popover

キャンペーンおよび追加情報

  • 本とまとめて購入すると、対象商品が10%OFFに!詳しくはこちらをご確認ください。 詳細はこちら (細則もこちらからご覧いただけます)
  • 【買取サービス】 Amazonアカウントを使用して簡単お申し込み。売りたいと思った時に、宅配買取もしくは出張買取を選択してご利用いただけます。 今すぐチェック。

Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。

  • Apple
  • Android
  • Android

無料アプリを入手するには、Eメールアドレスを入力してください。


商品の説明

内容紹介

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

レビュー

"...brings a no-nonsense serious technical edge, as you'd expect from O'Reilly. This means lots of code examples to work with, and no patronising along the way..." - Davey Winder, PC Plus, Spring 04

商品の説明をすべて表示する

登録情報

  • ペーパーバック: 531ページ
  • 出版社: Oreilly & Associates Inc (2004/02)
  • 言語: 英語
  • ISBN-10: 0596005458
  • ISBN-13: 978-0596005450
  • 発売日: 2004/02
  • 商品パッケージの寸法: 17.8 x 2.5 x 23.3 cm
  • おすすめ度: この商品の最初のレビューを書き込んでください。
  • Amazon 売れ筋ランキング: 洋書 - 293,270位 (洋書の売れ筋ランキングを見る)
  • さらに安い価格について知らせる
    この商品を出品する場合、出品者サポートを通じて更新を提案したいですか?

  • 目次を見る

カスタマーレビュー

Amazon.co.jp にはまだカスタマーレビューはありません
星5つ
星4つ
星3つ
星2つ
星1つ

Amazon.com で最も参考になったカスタマーレビュー (beta) (「Early Reviewer Program」のレビューが含まれている場合があります)

Amazon.com: 5つ星のうち 3.8 30 件のカスタマーレビュー
2 人中、2人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 3.0 Need Updating 2013/12/25
投稿者 Amazon Customer - (Amazon.com)
形式: ペーパーバック Amazonで購入
Very outdated material; moreover, needs to be updated to current methods of attacks, tools, and exploits. Furthermore, the entire beginning need to be replaced with a more appropriate introduction to reverse engineering in current architecture.

I enjoyed reading it and going down memory lane; however, security education is best experienced in the classroom of the Internet. A very dynamic topic that changes by the minute. Other than those criticisms, it had a good explanations of many vulnerabilities.
13 人中、11人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 4.0 To know the enemy 2005/2/28
投稿者 J. J. Kwashnak - (Amazon.com)
形式: ペーパーバック Amazonで購入
Security Warrior comes with the subject "Know Your Enemy" written across the top of the cover. In those three words, Peikari and Chuvakin give you the reason to read the book. O'Reilly's books are usually of the highest caliber, and happy to say this is shown in Security Warrior. The book is aimed at the security administrator, or the hard core computer person. While much of the book, and of security writing in general, is directed at UNIX systems there is a decent coverage of the Windows environment, which given its track record is in much more need of security warriors.

What the authors do is to give you the why and how of attacks and various threats, showing you some of the tools that can be used in these actions against you. The reader can then take these tools and turn them against the attackers, finding vulnerabilities first, and using other tools to counteract attacks and minimize damage. The first part looks at attacks at software, showing how reverse engineering can find out a lot more than might be planned as to how the program works. Things can get rather technical here but it's a great introduction to the mechanics of reverse engineering software and shows how someone could go looking for vulnerabilities, and finding out maybe not all the hows of the program, at least potential entry points in the software's operation.

Then it is on to OS and network security, with the focus on UNIX and some Windows Systems. The authors give some practical examples to explain what goes into attacks you commonly hear about - SQL Injection and Overflow attacks - but may not have seen demonstrated with examples. Many of the chapters and sections that are written about could and do fill whole books, but the authors do a very good job of balancing going beyond the surface of the topic without going too deeply down the technical details and examples to overwhelm or bore the reader. This is not a light, breeze through book, but a technical reference guide. It's one that I can see returning to again and again to help brush up understanding of certain topics as they are needed. This book is a very good starting point for overviewing the ideas as well as the mechanics of security attacks and to help you learn how to repulse them and become the security warrior. Know thy enemy is the necessity of the modern world.
4 人中、4人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 A lot of ground 2004/3/3
投稿者 James M. Kelly - (Amazon.com)
形式: ペーパーバック Amazonで購入
I've grown tired of books that simply inventory hacking tools. These authors delve deep and explain how things work. Awesome!!
This is an amazing book, covering an incredible amount of ground. I had a little trouble following some of the details on IDA Pro, but the authors were very responsive and helpful. This is the kind of book You'll want to read and re-read. I've got the chapters on software Reversing dog-eared already. The book is very well organized and well worth the investment.
17 人中、12人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 1.0 Technical accuracy escapes them. 2007/7/27
投稿者 John - (Amazon.com)
形式: ペーパーバック Amazonで購入
This book contains some okay level of steering, but that's about it. The technical accuracy I see exhibited here can only be rivaled by your grandma explaining Windows system internals. It doesn't end at just the author's confusion of C and C++ (classic "strcpy() and other C++ functions" babble); the very explanation of why a program crashes, or how an attack works, or how variables and buffers get created is flat wrong.

I had to stop reading this in the buffer overflow chapter. Highlights include the flawed interpretation of the error message from when bigmac() returned (it returned to non-mapped memory, the book says it read past the end of a string); the horrible explanation of how buffers work (buffers are not simple variables, and variables do not allocate multiple chunks of memory for themselves as explained); and the incorrect description of the return-to-text attack (returned to existing code, but the book says it's run code you injected onto the stack). After reading a stream of these such inaccuracies, I stopped looking for something that actually came out right.

The buffer overflow chapter can easily be replaced with Hacking: The Art of Exploitation. Read that instead. It's also got better networking and WEP attack explanations.
1 人中、0人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 4.0 Four Stars 2015/2/25
投稿者 duane d ellis - (Amazon.com)
形式: ペーパーバック Amazonで購入
ok
これらのレビューは参考になりましたか? ご意見はクチコミでお聞かせください。