40 likes | 57 Views
電腦攻擊與防禦 The Attack and Defense of Computers. CEA036 許富皓. Reference Books. Hacking Exposed, Fifth Edition Authors: Stuart McClure, Joel Scambray, and George Kurtz Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Authors: Simson Garfinkel and Gene Spafford
E N D
電腦攻擊與防禦 The Attack and Defense of Computers CEA036 許富皓
Reference Books • Hacking Exposed, Fifth Edition • Authors: Stuart McClure, Joel Scambray, and George Kurtz • Publisher: Mc Graw Hill • Practical Unix & Internet Security, 3rd Edition • Authors: Simson Garfinkel and Gene Spafford • Publisher: O Reilly
Contents: • Hacking Unix • Buffer Overflow Attacks/Return Into Libc Attacks • Internet Worm • Botnet • Format String Attacks • Input Validation Attacks • Integer Overflow and Integer Sign Attacks • TCP session Hijackng • Denial of Service Attacks/Distributed DoS • Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger • Cross Site Script (XSS) • Cross Site Request Forgert • SQL Injection • Footprinting • Scanning • Port-Scanning • OS fingerprinting
Grading: • Midterm 30% • Final 35% • Project 30% • Attendance: 5%