Seven Deadliest Network Attacks
Autor Stacy Prowell, Rob Kraus, Mike Borkinen Limba Engleză Paperback – iun 2010
The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense.
Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Preț: 179.53 lei
Preț vechi: 224.42 lei
-20% Nou
Puncte Express: 269
Preț estimativ în valută:
34.36€ • 36.25$ • 28.63£
34.36€ • 36.25$ • 28.63£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495493
ISBN-10: 1597495492
Pagini: 176
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 22 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597495492
Pagini: 176
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 22 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals of all levels; network admins; recreational hackersCuprins
Introduction Chapter 1. Denial of Service Chapter 2. War Dialing Chapter 3. Penetration "Testing" Chapter 4. Protocol Tunneling Chapter 5. Spanning Tree Attacks Chapter 6. Man-in-the-Middle Chapter 7. Password Replay
Recenzii
"Attacks may and will change, but the principles, assumptions and practices being used will likely remain the same for quite some time, and the authors did a good job explaining them. And that is the real value of this book." --Zeljka Zorz, Help Net Security
"[Knapp] provides a quite readable introduction to industrial networks and how familiar security principles can be translated to apply in this complex area…. Whether you are charged with defending an industrial network or curious about all the "buzz" over SCADA security, Knapp's book will provide a solid introduction to this fascinating area. Definitely a recommended read." --IEEE Security.org
"[Knapp] provides a quite readable introduction to industrial networks and how familiar security principles can be translated to apply in this complex area…. Whether you are charged with defending an industrial network or curious about all the "buzz" over SCADA security, Knapp's book will provide a solid introduction to this fascinating area. Definitely a recommended read." --IEEE Security.org