¾ÆÀ̵ðÀúÀå

[IT HOLIC series]½Ç½À Áß½ÉÀ¸·Î ÀÌÇØÇÏ´Â º¸¾È ³×Æ®¿öÅ© ÀÔ¹®
9791162890042 \15,000
2018-08-27 190*235
236 p
¹ÚÁ¾¹ü, À±È«
 

ÄÄÇ»ÅÍ Åë½Åº¸¾ÈÀ̶õ Á¦¸ñÀ¸·Î Part01¿¡¼­´Â ¾ÏÈ£ÀÇ ¿ª»ç¿Í ±âº»°³³äµé°ú Å° °ü¸® ¹æ½Ä¿¡ µû¸¥ ºÐ·ùÇÏ°í, ´ëÇ¥ÀûÀÎ ¾Ïȣȭ ¹æ½Ä¿¡ ´ëÇؼ­ À̾߱âÇÑ´Ù. Part02¿¡¼­´Â º¸¾È ¹× ÇØÄ¿ÀÇ ±âº»ÀûÀÎ °³³ä°ú ¿ª»ç ´ëÇؼ­ °£·«È÷ Á¤¸®ÇÏ°í, ³×Æ®¿öÅ© º¸¾È¿¡ °üÇÑ ÀÌ·Ð Á¤¸®¿Í °ü·ÃµÈ ½Ç½ÀÀ» ÅëÇØ ³×Æ®¿öÅ©»ó¿¡¼­ÀÇ º¸¾È°ú ¹®Á¦Á¡ ¹× ÇØ°áÃ¥¿¡ ´ëÇØ ¾ð±ÞÇÒ °ÍÀÌ´Ù. ¶ÇÇÑ ½Ã½ºÅÛ º¸¾È¿¡ °üÇÑ À̷аú ½Ç½À¿¡ ´ëÇؼ­ °£·«È÷ ±â¼úÇÑ´Ù. Part03¿¡¼­´Â º¸¾È ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ »çÇ×µéÀ» ÀÌ¿ëÇÏ¿© ÇÁ·ÎÁ§Æ®¸¦ ¼öÇàÇϵµ·Ï Çϸç, Part02 ³»¿ë Áß¿¡¼­ ³×Æ®¿öÅ© º¸¾È¿¡ °üÇÑ ÇÁ·ÎÁ§Æ®¸¦ ¼öÇàÇÒ °ÍÀ̹ǷÎ, ÀÌ ºÎºÐÀÇ ½Ç½ÀÀ» ¼±ÇàÇÏ°íÀÚ ÇÒ ¶§´Â ³×Æ®¿öÅ© º¸¾È ³»¿ëÀ» ¼÷Áö
ÇÑ ÈÄ¿¡ ½Ç½ÀÇϵµ·Ï ÇÑ´Ù.

¹Ú Á¾ ¹ü
2002 ~ ÇöÀç ÇѾ翩ÀÚ´ëÇб³ Á¤º¸°æ¿µ°ú ±³¼ö
2001³â ±¤¿î´ëÇб³ Á¦¾î°èÃø°øÇÐ ¹Ú»ç
1991 ~ 2002³â Çѱ¹Àü·Â°ø»ç Àü·Â¿¬±¸¿ø ¼±ÀÓ

À± È«
2008 Çѱ¹Ç×°ø´ëÇб³ Ç×°øÁ¤º¸Åë½Å°øÇÐ ¹Ú»ç
2003 ~ 2008 ºÎõ/µ¿¼­¿ï´ëÇб³ °âÀÓ±³¼ö
2005 ~2008 ÇѾ翩ÀÚ´ëÇб³ °­»ç

PART 01 ÄÄÇ»ÅÍ Åë½Åº¸¾È
Chapter01 ¾ÏÈ£ÀÇ ¿ª»ç
1 °í´ëÀÇ ¾ÏÈ£
2 ±Ù´ëÀÇ ¾ÏÈ£
3 Çö´ëÀÇ ¾ÏÈ£

Chapter02 ¾Ïȣȭ ½Ã½ºÅÛ
1 °øÀ¯ ºñ¹ÐÅ° ¾Ïȣȭ ¹æ½Ä
2 °ø°³Å° ¾Ïȣȭ ¹æ½Ä(°øÀ¯ ºñ¹ÐÅ° ¾Ï/º¹È£È­ ¹æ½Ä)
(1) °ø°³Å° ¾ÏÈ£ÀÇ Å° °ü¸® ¹æ½Ä
(2) °ø°³Å° ¾Ïȣȭ ¹æ½Ä(RSA)

Chapter03 ÀÎÁõÀ̶õ?
1 ¸Þ½ÃÁö ÀÎÁõ
2 ³×Æ®¿öÅ© Á¢±Ù ÀÎÁõ
3 µðÁöÅÐ ¼­¸í

PART 02 ³×Æ®¿öÅ© Åë½Åº¸¾È
Chapter04 º¸¾ÈÀ̶õ?
1 ÄÄÇ»ÅÍ º¸¾ÈÀÇ ¿ª»ç
(1) º¸¾ÈÀÇ ½ÃÃÊ
(2) ÄÄÇ»ÅÍ º¸¾È ¹ßÀü»ç
2 Çö´ëÀÇ ³×Æ®¿öÅ© º¸¾È ¹× º¸¾È Ç¥ÁØ
(1) Çö´ëÀÇ º¸¾È
(2) º¸¾È ±âº» ¿ä¼Ò
3 ÇØÅ·ÀÇ Á¤ÀÇ
(1) ÇØÄ¿ÀÇ À¯·¡
(2) ´ëÇ¥ÀûÀÎ ÇØÅ· »ç·Ê
(3) ¿ì¸®³ª¶ó ó¹ú ±âÁØ
4 ÇØÅ·ÀÇ À¯Çü
(1) Æ®·ÎÀÌ ¸ñ¸¶(Trojan Horse)
(2) ¾²·¹±â ÁÖ¿ö ¸ðÀ¸±â(Scavenging)
(3) ³í¸®Æøź(Logic Bomb)
(4) »ì¶ó¹Ì ±â¹ý(Salami Techniques)
(5) ¾Ç¼ºÄÚµå °æÀ¯Áö
(6) ¾Ç¼ºÄÚµå À¯Æ÷Áö

Chapter05 ³×Æ®¿öÅ©ÀÇ ±âº» °³³ä
1 ³×Æ®¿öÅ©ÀÇ Á¾·ù
2 ÇÁ·ÎÅäÄÝ
(1) OSI 7°èÃþ
(2) TCP/IP ÇÁ·ÎÅäÄÝ
3 IP(Internetworking Protocol)
(1) ÀÎÅÍ³Ý ÁÖ¼ÒÀÇ Å¬·¡½ºº° ºÐ·ù
(2) ¼­ºê³ÝÆÃ
(3) IP Çì´õÀÇ Çü½Ä
4 TCP(Transmission Control Protocol)
(1) TCPÀÇ Æ¯Â¡
(2) TCPÀÇ ±¸¼º
(3) TCP ¿¬°áÀÇ ¼³Á¤°ú Á¾·á
5 UDP(User Datagram Protocol)
(1) UDP °èÃþÀÇ ±¸¼º
(2) UDP ÆÐŶ Çü½Ä
(3) UDP ÇÁ·ÎÅäÄÝ ¼­ºñ½º(TFTP)

Chapter06 ¶ó¿ìÆðú ½ºÀ§Äª
1 ¶ó¿ìÆÃÀÇ ±âº» °³³ä
(1) ¿î¿µÃ¼Á¦ÀÇ ¶ó¿ìÆà Å×À̺í
(2) ¶ó¿ìÅÍ¿¡¼­ÀÇ ¶ó¿ìÆÃ
2 ¶ó¿ìÆÃÀÇ Á¾·ù
(1) Á¤Àû¶ó¿ìÆÃ
(2) µ¿Àû¶ó¿ìÆÃ
(3) ¶ó¿ìÆà ÇÁ·ÎÅäÄÝÀÇ Á¾·ù
3 ½ºÀ§Äª°ú Çãºê
(1) ½ºÀ§Ä¡ Çãºê
(2) ½ºÀ§Äª ±â¼ú
(3) ½ºÀ§Äª ¹æ½Ä

Chapter07 NAT(Network Address Translation)
1 °³¿ä
2 NAT ¼­¹ö ±¸¼ºµµ

Chapter08 ½ºÄµ
1 ½ºÄµÀ̶õ?
(1) ³×Æ®¿öÅ©¿Í ½Ã½ºÅÛ »óÅ ȮÀÎÇÏ´Â PING SCAN
(2) TCP ¹× UDP SCAN

Chapter09 ½Ã½ºÅÛ ÇØÅ· ¹æ½Ä
1 ½Ã½ºÅÛº¸¾È ¿ä¼Ò ¹× Æнº¿öµå Å©·¡Å·
(1) º¸¾ÈÀÇ ¿ä¼Ò
(2) Æнº¿öµå Å©·¡Å·
2 Æнº¿öµå ¹éµµ¾î

PART 03 º¸¾È ÇÁ·ÎÁ§Æ® ½Ç½À
Chapter10 ³×Æ®¿öÅ© º¸¾È ½Ç½À(½ºÇªÇÎ)
1 ³×Æ®¿öÅ© ÀϹÝ
(1) OSI 7 layer
(2) ARP ½ºÇªÇÎ
2 ½ºÇªÇÎ °ø°Ý ¹× ÇØ°á ¹æ¾È
(1) ½ºÇªÇÎ Á¾·ù
(2) ½ºÇªÇÎ ÇØ°á ¹æ¾È

Chapter11 ARP(Address Resolution Protocol)
1 ARP µ¿ÀÛ
(1) ARP ij½Ã
(2) ARP ÆÐŶ Çü½Ä

Chapter12 ½ºÅ×°¡³ë±×·¡ÇÇ(steganography)
1 ½ºÅ×°¡³ë±×·¡ÇÇ À¯·¡
2 ½ºÅ×°¡³ë±×·¡ÇÇ ¾Ïȣȭ ¹æ¹ý

ºÎ ·Ï
A À©µµ¿ì ÄÉÀÌºí ±âÃÊ
B À©µµ¿ì Å͹̳Π¼­ºñ½º¿Í ½ºÅ×°¡³ë±×·¡ÇÇ Tools