Extreme Exploits : Advanced Defenses Against Hardcore Hacks

Victor Oppleman, Oliver Friedrichs, Brett Watson

  • 出版商: McGraw-Hill Osborne Media
  • 出版日期: 2005-07-18
  • 售價: $850
  • 語言: 英文
  • 頁數: 448
  • 裝訂: Paperback
  • ISBN: 0072259558
  • ISBN-13: 9780072259551

立即出貨 (庫存 < 4)

買這商品的人也買了...

商品描述

Description:

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You’ll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you’ll learn to prepare your network and software from threats that don’t yet exist. This is a must-have volume for anyone responsible for network security.

 

Table of Contents:

Part 1: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact From Fiction
Chapter 3: Securing the Domain Name System
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter
Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: Remote Application Access and Filtering
Chapter 9: E-Mail Gateways, Filtering, and Redundancy
Chapter 10: Data Leaks -- Exploiting Egress
Chapter 11: Sinkhole and Backscatter Tools
Chapter 12: Securing Wireless Networks
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals
Chapter 13: Public Information that Pro's Miss (but attackers don't)
Chapter 14: Coordination of Tools for Maximum Recon
Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments
Chapter 16: Deploy: ATTACK / DEFEND
Part 4: You've been hacked: What comes next?
Chapter 17: Identifying Recon and Attacks in Progress
Chapter 18: Identifying, Containing, and Mitigating the Infiltration
Chapter 19: Exploiting Digital Forensics
Part 5: Designing New Threats and Countermeasures for Tomorrow
Chapter 20: Viruses, Worms, Trojans, and Malware
Chapter 21: Exploiting Software