Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to implement appropriate network security solutions within a laboratory environment. Topics covered include CAM table poisoning attacks on network switches, ARP cache poisoning attacks, the detection and prevention of abnormal ARP traffic, network traffic sniffing and the detection of NICs running in promiscuous mode, and IP-based DoS attacks. It also examines reconnaissance traffic, network traffic filtering and inspection, and IPsec VPN security solution protocols, standards, types, and deployments.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.