(The book is the companion volume of "Introduction to Hacker Attack and Defense". From the two different perspectives of "attack" and "defense", through real intrusion/intrusion examples, and the author's experience and experience, it reproduces network intrusion/intrusion with pictures and texts. The entire process of entry and protection. This book is divided into 3 parts and 11 chapters, which systematically introduces the comprehensive process of intrusion/intrusion, and the corresponding protection methods and methods. These include information collection, authentication-based intrusion/intrusion and protection, vulnerability-based intrusion/intrusion and protection, Trojan-based intrusion/intrusion and protection, hidden technology during intrusion/intrusion, backdoor after intrusion/intrusion, and clearing Footprint technology. This book uses a graphical method to analyze each intrusion/intrusion process in detail to estimate the intrusion/intrusion intention of the intruder; necessary explanations and answers to common problems in the intrusion/intrusion process; And some common intrusion/intrusion methods are compared and analyzed, in order to facilitate readers to understand the methods and methods commonly used by intruders/intruders to protect network security.
Detailed explanation of hacker attack and defense.pdf
.....)