The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and…mehr
The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
Inhaltsangabe
FOREWORD ACKNOWLEDGMENTS INTRODUCTION Part I: Challenges Chapter 1: To Catch a Phish Chapter 2: Owning the Pharm Chapter 3: Big Bait, Big Phish Chapter 4: Shooting Phish in a Barrel Chapter 5: Too Few Secrets Chapter 6: Upgraded or "Owned?" Chapter 7: Pale Blue Glow Chapter 8: Crossing the Line Chapter 9: The Root of the Problem Chapter 10: Firewall Insights Chapter 11: Peter LemonJello's "A Series of Unfortunate Events" Chapter 12: Share and Share Alike Chapter 13: The Holy Grail Chapter 14: Open Source Chapter 15: Cup of Chai Chapter 16: Love Plus One Chapter 17: Bullet in the Blue Sky Chapter 18: The Insider III Chapter 19: Jumping Someone Else's Train Chapter 20: The Not-So-Usual Suspects Part II: Solutions Chapter 1: To Catch a Phish Chapter 2: Owning the Pharm Chapter 3: Big Bait, Big Phish Chapter 4: Shooting Phish in a Barrel Chapter 5: Too Few Secrets Chapter 6: Upgraded or "Owned?" Chapter 7: Pale Blue Glow Chapter 8: Crossing the Line Chapter 9: The Root of the Problem Chapter 10: Firewall Insights Chapter 11: Peter LemonJello's "A Series of Unfortunate Events" Chapter 12: Share and Share Alike Chapter 13: The Holy Grail Chapter 14: Open Source Chapter 15: Cup of Chai Chapter 16: Love Plus One Chapter 17: Bullet in the Blue Sky Chapter 18: The Insider III Chapter 19: Jumping Someone Else's Train Chapter 20: The Not-So-Usual Suspects INDEX
FOREWORD ACKNOWLEDGMENTS INTRODUCTION Part I: Challenges Chapter 1: To Catch a Phish Chapter 2: Owning the Pharm Chapter 3: Big Bait, Big Phish Chapter 4: Shooting Phish in a Barrel Chapter 5: Too Few Secrets Chapter 6: Upgraded or "Owned?" Chapter 7: Pale Blue Glow Chapter 8: Crossing the Line Chapter 9: The Root of the Problem Chapter 10: Firewall Insights Chapter 11: Peter LemonJello's "A Series of Unfortunate Events" Chapter 12: Share and Share Alike Chapter 13: The Holy Grail Chapter 14: Open Source Chapter 15: Cup of Chai Chapter 16: Love Plus One Chapter 17: Bullet in the Blue Sky Chapter 18: The Insider III Chapter 19: Jumping Someone Else's Train Chapter 20: The Not-So-Usual Suspects Part II: Solutions Chapter 1: To Catch a Phish Chapter 2: Owning the Pharm Chapter 3: Big Bait, Big Phish Chapter 4: Shooting Phish in a Barrel Chapter 5: Too Few Secrets Chapter 6: Upgraded or "Owned?" Chapter 7: Pale Blue Glow Chapter 8: Crossing the Line Chapter 9: The Root of the Problem Chapter 10: Firewall Insights Chapter 11: Peter LemonJello's "A Series of Unfortunate Events" Chapter 12: Share and Share Alike Chapter 13: The Holy Grail Chapter 14: Open Source Chapter 15: Cup of Chai Chapter 16: Love Plus One Chapter 17: Bullet in the Blue Sky Chapter 18: The Insider III Chapter 19: Jumping Someone Else's Train Chapter 20: The Not-So-Usual Suspects INDEX
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497