kalo mo baca lengkap bisa lihat di www.mcp.com, search saja hacker
jangan lupa subscribe dulu . . 

> -----Original Message-----
> From: Irwan Hadi [SMTP:[EMAIL PROTECTED]]
> Sent: 04 Juli 1999 9:12
> To:   [EMAIL PROTECTED]
> Subject:      [ Hackerlink ] Maximum Security
> 
> Maximum Security: A Hacker's Guide to
>  Protecting Your Internet Site and Network
> 
>                                          
> 
> 
>                              Table of Contents:
> 
>      Introduction 
> 
> I Setting the Stage
> 
>      Chapter 1 - Why Did I Write This Book? 
>      Chapter 2 - How This Book Will Help You 
>      Chapter 3 - Hackers and Crackers 
>      Chapter 4 - Just Who Can Be Hacked, Anyway? 
> 
> II Understanding the Terrain
> 
>      Chapter 5 - Is Security a Futile Endeavor? 
>      Chapter 6 - A Brief Primer on TCP/IP 
>      Chapter 7 - Birth of a Network: The Internet 
>      Chapter 8 - Internet Warfare 
> 
> III Tools
> 
>      Chapter 9 - Scanners 
>      Chapter 10 - Password Crackers 
>      Chapter 11 - Trojans 
>      Chapter 12 - Sniffers 
>      Chapter 13 - Techniques to Hide One's Identity 
>      Chapter 14 - Destructive Devices 
> 
> IV Platforms and Security
> 
>      Chapter 15 - The Hole 
>      Chapter 16 - Microsoft 
>      Chapter 17 - UNIX: The Big Kahuna 
>      Chapter 18 - Novell 
>      Chapter 19 - VAX/VMS 
>      Chapter 20 - Macintosh 
>      Chapter 21 - Plan 9 from Bell Labs 
> 
> V Beginning at Ground Zero
> 
>      Chapter 22 - Who or What Is Root? 
>      Chapter 23 - An Introduction to Breaching a Server Internally 
>      Chapter 24 - Security Concepts 
> 
> VI The Remote Attack
> 
>      Chapter 25 - The Remote Attack 
>      Chapter 26 - Levels of Attack 
>      Chapter 27 - Firewalls 
>      Chapter 28 - Spoofing Attacks 
>      Chapter 29 - Telnet-Based Attacks 
>      Chapter 30 - Language, Extensions, and Security 
> 
> VII The Law
> 
>      Chapter 31 - Reality Bytes: Computer Security and the Law 
> 
> VIII Appendixes
> 
>      Appendix A - How to Get More Information 
>      Appendix B - Security Consultants 
>      Appendix C - A Hidden Message About the Internet 
>      Appendix D - What's on the CD-ROM 
> 
> 
> 
> 
> 
>  http://www.securitysearch.net/cgi-bin/search/vote.cgi?ID=928555811
>  -------------------------------------------------------------------
>  untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
>  untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
>  arsip berada di  http://www.mail-archive.com/[email protected]
>  


 http://www.securitysearch.net/cgi-bin/search/vote.cgi?ID=928555811
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke