電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓
Reference Books Hacking Exposed, Fifth Edition Hacking Exposed, Fifth Edition –Authors: Stuart McClure, Joel Scambray, and George Kurtz –Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Practical Unix & Internet Security, 3rd Edition –Authors: Simson Garfinkel and Gene Spafford –Publisher: O Reilly
Contents: Footprinting Footprinting Scanning Scanning Enumeration Enumeration Port-Scanning Port-Scanning OS fingerprinting. OS fingerprinting. Hacking Unix Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Internet Worm Format String Attacks Format String Attacks Input Validation Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks Integer Overflow and Integer Sign Attacks TCP session Hijackng TCP session Hijackng Denial of Service Attacks/Distributed DoS Denial of Service Attacks/Distributed DoS Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Cross Site Script (XSS) Cross Site Script (XSS) SQL Injection SQL Injection
Important Security ConferencesImportant Security Conferences: Important Security Conferences
Grading: Midterm 30% Midterm 30% Final 35% Final 35% Assignment 30% Assignment 30% Attendance: 5% Attendance: 5%