Cantitate/Preț
Produs

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Autor Victor Oppleman, Oliver Friedrichs, Brett Watson
en Limba Engleză Paperback – 15 aug 2005
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.
Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis’ databases gaining access to the personal files of as many as 32,000 people.
Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.
Citește tot Restrânge

Preț: 28130 lei

Preț vechi: 35162 lei
-20% Nou

Puncte Express: 422

Preț estimativ în valută:
5388 5841$ 4479£

Carte disponibilă

Livrare economică 11-25 noiembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780072259551
ISBN-10: 0072259558
Pagini: 419
Greutate: 0.74 kg
Ediția:New.
Editura: McGraw Hill Education
Colecția McGraw-Hill Education
Locul publicării:United States

Cuprins

Part 1: Core Internet Infrastructure for Security Professionals

Chapter 1: Internet Infrastructure for Security Professionals

Chapter 2: ISP Security Practices: Separating Fact From Fiction

Chapter 3: Securing the Domain Name System

Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter

Chapter 4: Reliable Connectivity

Chapter 5: Securing the Perimeter

Chapter 6: DMZs In-Depth

Chapter 7: Intrusion Detection and Prevention

Chapter 8: Remote Application Access and Filtering

Chapter 9: E-Mail Gateways, Filtering, and Redundancy

Chapter 10: Data Leaks -- Exploiting Egress

Chapter 11: Sinkhole and Backscatter Tools

Chapter 12: Securing Wireless Networks

Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals

Chapter 13: Public Information that Pro's Miss (but attackers don't)

Chapter 14: Coordination of Tools for Maximum Recon

Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments

Chapter 16: Deploy: ATTACK / DEFEND

Part 4: You've been hacked: What comes next?

Chapter 17: Identifying Recon and Attacks in Progress

Chapter 18: Identifying, Containing, and Mitigating the Infiltration

Chapter 19: Exploiting Digital Forensics

Part 5: Designing New Threats and Countermeasures for Tomorrow

Chapter 20: Viruses, Worms, Trojans, and Malware

Chapter 21: Exploiting Software