Cantitate/Preț
Produs

Hacker's Challenge 3

Autor David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
en Limba Engleză Paperback – 16 iun 2006
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.
Citește tot Restrânge

Preț: 33120 lei

Preț vechi: 41400 lei
-20% Nou

Puncte Express: 497

Preț estimativ în valută:
6338 6584$ 5265£

Carte disponibilă

Livrare economică 11-25 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780072263046
ISBN-10: 0072263040
Pagini: 400
Ilustrații: 100 illus.
Dimensiuni: 185 x 229 x 21 mm
Greutate: 0.69 kg
Ediția:3rd ed.
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States

Public țintă

General/trade

Cuprins

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

Part I: Challenges

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

Part II: Solutions

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

INDEX