InfoSecurity 2008 Threat Analysis
Autor Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg Contribuţii de Paul Schoopingen Limba Engleză Paperback – 7 noi 2007
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
Preț: 236.90 lei
Preț vechi: 296.13 lei
-20% Nou
Puncte Express: 355
Preț estimativ în valută:
45.33€ • 47.46$ • 37.51£
45.33€ • 47.46$ • 37.51£
Carte tipărită la comandă
Livrare economică 31 martie-14 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597492249
ISBN-10: 1597492248
Pagini: 480
Dimensiuni: 191 x 235 x 30 mm
Greutate: 0.79 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597492248
Pagini: 480
Dimensiuni: 191 x 235 x 30 mm
Greutate: 0.79 kg
Editura: ELSEVIER SCIENCE
Public țintă
* Co-branded Syngress and Infosecurity Magazine and featuring best of breed writers from both* Featured placement on Infosecurity.com, ads in Infosecurity print magazine (25K circ, 10K in U.S.), and in e-newsletter (15K circ)
* Featured at Infosecurity booth at high traffic shows such as Infosecurity US, Infosecurity Canada, and Infosecurity Europe
Cuprins
Foreword
Part I: Botnets
Chapter 1 Botnets: A Call to Action
Introduction
The Killer Web App
How Big is the Problem?
The Industry Responds
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2 Botnets Overview
What is a Botnet?
The Botnet Life Cycle
What Does a Botnet Do?
Botnet Economic
Summary
Solutions Fast Track
Frequently Asked Questions
Part II Cross Site Scripting Attacks
Chapter 3 Cross-site Scripting Fundamentals
Introduction
Web Application Security
XML and AJAX Introduction
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4 XSS Theory
Introduction
Getting XSS'ed
DOM-based XSS in Detail
Redirection
CSRF
Flash, QuickTime, PDF, Oh My
HTTP Response Injection
Source vs. DHTML Reality
Bypassing XSS Length Limitations
XSS Filter Evasion
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5 XSS Attack Methods
Introduction
History Stealing
Intranet Hacking
XSS Defacements
Summary
Solutions Fast Track
Frequently Asked Questions
References
Part III Physical and Logical Security Convergence
Chapter 6 Protecting Critical
Infrastructure: Process Control and SCADA
Introduction
Technology Background: Process Control Systems
Why Convergence?
Threats and Challenges
Conclusion
Chapter 7 Final Thought
Introduction
Final Thoughts from William Crower
Final Thoughts from Dan Dunkel
Final Thoughts from Brian Contos
Final Thoughts from Colby DeRodeoff
Part IV PCI Compliance
Chapter 8 Why PCi is Important
Introduction
What is PCI?
Overview of PCI Requirements
Risks and Consequences
Benefits of Compliance
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9 Protect Cardholder Data
Protecting Cardholder Data
PCI Requirement 3: Protect Stored Cardholder Data
PCI Requirement 4~Encrypt Transmission of Cardholder Data Across Open, Public Networks
Using Compensating Controls
Mapping Out a Strategy
The Absolute Essentials
Summary
Solutions Fast Track
Frequently Asked Questions
Part V Asterisk and VolP Hacking
Chapter 10 Understanding and Taking Advantage of VolP Protocols
Introduction
Your Voice to Data
Making Your Voice Smaller
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11 Asterisk Hardware Ninjutsu
Introduction
Serial
Motion
Modems
Fun with Dialing
Legalities and Tips
Summary
Solutions Fast Track
Frequently Asked Questions
Part VI Hack the Stack
Chapter 12 Social Engineering
Introduction
Attacking the People Layer
Defending the People Layer
Making the Case for Stronger Security
People Layer Security Project
Summary
Solutions Fast Track
Frequently Asked Questions
Index