Take network security to the next level! This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure. Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing…mehr
Take network security to the next level! This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure. Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications.
Inhaltsangabe
Part 1: Core Internet Infrastructure for Security Professionals Chapter 1: Internet Infrastructure for Security Professionals Chapter 2: ISP Security Practices: Separating Fact From Fiction Chapter 3: Securing the Domain Name System Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter Chapter 4: Reliable Connectivity Chapter 5: Securing the Perimeter Chapter 6: DMZs In-Depth Chapter 7: Intrusion Detection and Prevention Chapter 8: Remote Application Access and Filtering Chapter 9: E-Mail Gateways, Filtering, and Redundancy Chapter 10: Data Leaks -- Exploiting Egress Chapter 11: Sinkhole and Backscatter Tools Chapter 12: Securing Wireless Networks Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals Chapter 13: Public Information that Pro's Miss (but attackers don't) Chapter 14: Coordination of Tools for Maximum Recon Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments Chapter 16: Deploy: ATTACK / DEFEND Part 4: You've been hacked: What comes next? Chapter 17: Identifying Recon and Attacks in Progress Chapter 18: Identifying, Containing, and Mitigating the Infiltration Chapter 19: Exploiting Digital Forensics Part 5: Designing New Threats and Countermeasures for Tomorrow Chapter 20: Viruses, Worms, Trojans, and Malware Chapter 21: Exploiting Software
Part 1: Core Internet Infrastructure for Security Professionals Chapter 1: Internet Infrastructure for Security Professionals Chapter 2: ISP Security Practices: Separating Fact From Fiction Chapter 3: Securing the Domain Name System Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter Chapter 4: Reliable Connectivity Chapter 5: Securing the Perimeter Chapter 6: DMZs In-Depth Chapter 7: Intrusion Detection and Prevention Chapter 8: Remote Application Access and Filtering Chapter 9: E-Mail Gateways, Filtering, and Redundancy Chapter 10: Data Leaks -- Exploiting Egress Chapter 11: Sinkhole and Backscatter Tools Chapter 12: Securing Wireless Networks Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals Chapter 13: Public Information that Pro's Miss (but attackers don't) Chapter 14: Coordination of Tools for Maximum Recon Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments Chapter 16: Deploy: ATTACK / DEFEND Part 4: You've been hacked: What comes next? Chapter 17: Identifying Recon and Attacks in Progress Chapter 18: Identifying, Containing, and Mitigating the Infiltration Chapter 19: Exploiting Digital Forensics Part 5: Designing New Threats and Countermeasures for Tomorrow Chapter 20: Viruses, Worms, Trojans, and Malware Chapter 21: Exploiting Software
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497