(This book provides a comprehensive introduction to network security and hacker defense techniques. In order to prevent hackers, this book first analyzes various attack methods on the network, and then gives corresponding defense strategies for different attack methods. The book is divided into 12 chapters, including Trojan horses, network bombs, network monitoring and Sniffer, scanners, password cracking, Web attack and defense, denial of service attacks, spoofing attacks, common system vulnerabilities and computer viruses. In addition to introducing the relevant theories, this book also gives a detailed description of the use of some related software. The important part is also analyzed from the source code, so that readers can understand the comprehensive attack process of hackers, so as to strengthen the readers' defense, knowledge and improvement. Readers' "anti-black" technical level. This book is rich in content, easy to understand, easy to understand, suitable for those readers who want to strengthen the security of their own systems and who are interested in hacker defense technology.
23db4121daf7b8d7c86dda8dd354a012.pdf)