Seven Deadliest USB Attacks
Autor Brian Anderson, Barbara Andersonen Limba Engleză Paperback – 2 iun 2010
The book provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. There are seven chapters that cover the following: USB Hacksaw; the USB Switchblade; viruses and malicious codes; USB-based heap overflow; the evolution of forensics in computer security; pod slurping; and the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements.
This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It will be a valuable resource for information security professionals of all levels, as well as web application developers and recreational hackers.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Preț: 185.70 lei
Preț vechi: 232.13 lei
-20% Nou
Puncte Express: 279
Preț estimativ în valută:
35.54€ • 37.38$ • 29.42£
35.54€ • 37.38$ • 29.42£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495530
ISBN-10: 1597495530
Pagini: 256
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.53 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597495530
Pagini: 256
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.53 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals of all levels; web application developers; recreational hackersCuprins
Introduction Chapter 1. USB Hacksaw Chapter 2. USB Switchblade Chapter 3. USB Based Virus / Malicious Code Launch Chapter 4. USB Device OverFlow Chapter 5. USB Ramdump Chapter 6. Podslurping - A USB Problem Chapter 7. Social Engineering and USB Come Together for a Brutal Attack
Recenzii
"Seven Deadliest USB Attacks provides real-world insight into issues a good deal of computer users don't even realize exist. The author's clear voice profiles attack scenarios, tools, as well as mitigation techniques. This book raises the right questions and provides the right answers" --Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine