Client-Side Attacks and Defense
Autor Sean-Philip Oriyano, Robert Shimonskien Limba Engleză Paperback – 18 dec 2012
- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
- Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit—the client-side attack
- Defend your network against attacks that target your company's most vulnerable asset—the end user
Preț: 323.64 lei
Preț vechi: 404.55 lei
-20% Nou
Puncte Express: 485
Preț estimativ în valută:
61.96€ • 67.13$ • 51.74£
61.96€ • 67.13$ • 51.74£
Carte tipărită la comandă
Livrare economică 12-26 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495905
ISBN-10: 1597495905
Pagini: 296
Ilustrații: Approx. 70 illustrations
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: Elsevier
ISBN-10: 1597495905
Pagini: 296
Ilustrații: Approx. 70 illustrations
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: Elsevier
Public țintă
Penetration testers; security consultants; system and network administrators; IT auditorsCuprins
Introduction
Chapter 1: Background on Attacks
Chapter 2: A Closer Look at Client-Side Attacks
Chapter 3: A History of Web Browsers
Chapter 4: The Problem with Browsers
Chapter 5: Exploring and Exploiting Active Content
Chapter 6: Browser Defenses
Chapter 7: E-mail Client Attacks
Chapter 8: E-mail Client Defenses
Chapter 9: Web Applications
Chapter 10: Web Applications and Client Defenses
Chapter 11: Other Client-Side Attack Targets
Chapter 12: Malware
Chapter 13: Client-Side Countermeasures
Chapter 14: The Road Ahead
Chapter 1: Background on Attacks
Chapter 2: A Closer Look at Client-Side Attacks
Chapter 3: A History of Web Browsers
Chapter 4: The Problem with Browsers
Chapter 5: Exploring and Exploiting Active Content
Chapter 6: Browser Defenses
Chapter 7: E-mail Client Attacks
Chapter 8: E-mail Client Defenses
Chapter 9: Web Applications
Chapter 10: Web Applications and Client Defenses
Chapter 11: Other Client-Side Attack Targets
Chapter 12: Malware
Chapter 13: Client-Side Countermeasures
Chapter 14: The Road Ahead