Extreme Exploits : Advanced Defenses Against Hardcore Hacks
Victor Oppleman, Oliver Friedrichs, Brett Watson
- 出版商: McGraw-Hill Education
- 出版日期: 2005-07-18
- 定價: $1,700
- 售價: 5.0 折 $850
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 0072259558
- ISBN-13: 9780072259551
-
相關分類:
資訊安全
立即出貨 (庫存 < 4)
買這商品的人也買了...
-
$680$578 -
$1,200$1,176 -
$1,176Database Management Systems, 3/e (IE-Paperback)
-
$3,420Agile Software Development: Principles, Patterns, and Practices (Hardcover)
-
$780CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
-
$590$466 -
$590$466 -
$560$476 -
$2,030$1,929 -
$650$507 -
$199$155 -
$550$468 -
$880$748 -
$820$697 -
$550$468 -
$650$507 -
$1,188Core C# and .NET (Paperback)
-
$480$408 -
$580$493 -
$780$616 -
$680$449 -
$480$408 -
$450$383 -
$450$351 -
$580$493
相關主題
商品描述
Description:
Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You’ll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you’ll learn to prepare your network and software from threats that don’t yet exist. This is a must-have volume for anyone responsible for network security.
Table of Contents:
Part 1: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact From Fiction
Chapter 3: Securing the Domain Name System
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter
Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: Remote Application Access and Filtering
Chapter 9: E-Mail Gateways, Filtering, and Redundancy
Chapter 10: Data Leaks -- Exploiting Egress
Chapter 11: Sinkhole and Backscatter Tools
Chapter 12: Securing Wireless Networks
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals
Chapter 13: Public Information that Pro's Miss (but attackers don't)
Chapter 14: Coordination of Tools for Maximum Recon
Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments
Chapter 16: Deploy: ATTACK / DEFEND
Part 4: You've been hacked: What comes next?
Chapter 17: Identifying Recon and Attacks in Progress
Chapter 18: Identifying, Containing, and Mitigating the Infiltration
Chapter 19: Exploiting Digital Forensics
Part 5: Designing New Threats and Countermeasures for Tomorrow
Chapter 20: Viruses, Worms, Trojans, and Malware
Chapter 21: Exploiting Software