"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--…mehr
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense Security Intelligence Services; a business unit of VeriSign, Inc. iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and three-letter agencies in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors. iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the what, the when and the where), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the who and the why). For more information, please contact customerservice@idefense.com.
Inhaltsangabe
Cyber Security Fundamentals. Network and Security Concepts. Microsoft Windows Security Principles. Attacker Techniques and Motivations. How Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection, Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating Malicious Code. Evading Detection and Elevating Privileges. Stealing Information and Exploitation. Defense and Analysis Techniques. Memory Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code Analysis Systems. Intrusion Detection Systems. iDefense Special File Investigation Tools.
Cyber Security Fundamentals. Network and Security Concepts. Microsoft Windows Security Principles. Attacker Techniques and Motivations. How Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection, Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating Malicious Code. Evading Detection and Elevating Privileges. Stealing Information and Exploitation. Defense and Analysis Techniques. Memory Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code Analysis Systems. Intrusion Detection Systems. iDefense Special File Investigation Tools.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826