Extreme Exploits : Advanced Defenses Against Hardcore Hacks

Victor Oppleman, Oliver Friedrichs, Brett Watson

  • 出版商: McGraw-Hill Education
  • 出版日期: 2005-07-18
  • 定價: $1,700
  • 售價: 5.0$850
  • 語言: 英文
  • 頁數: 448
  • 裝訂: Paperback
  • ISBN: 0072259558
  • ISBN-13: 9780072259551
  • 相關分類: 資訊安全
  • 立即出貨 (庫存 < 4)

買這商品的人也買了...

商品描述

Description:

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You’ll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you’ll learn to prepare your network and software from threats that don’t yet exist. This is a must-have volume for anyone responsible for network security.

 

Table of Contents:

Part 1: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact From Fiction
Chapter 3: Securing the Domain Name System
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter
Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: Remote Application Access and Filtering
Chapter 9: E-Mail Gateways, Filtering, and Redundancy
Chapter 10: Data Leaks -- Exploiting Egress
Chapter 11: Sinkhole and Backscatter Tools
Chapter 12: Securing Wireless Networks
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals
Chapter 13: Public Information that Pro's Miss (but attackers don't)
Chapter 14: Coordination of Tools for Maximum Recon
Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments
Chapter 16: Deploy: ATTACK / DEFEND
Part 4: You've been hacked: What comes next?
Chapter 17: Identifying Recon and Attacks in Progress
Chapter 18: Identifying, Containing, and Mitigating the Infiltration
Chapter 19: Exploiting Digital Forensics
Part 5: Designing New Threats and Countermeasures for Tomorrow
Chapter 20: Viruses, Worms, Trojans, and Malware
Chapter 21: Exploiting Software

 

商品描述(中文翻譯)

描述:
保護您的網絡和網站免受惡意攻擊,請參考這本尖端指南。《極限攻擊》充滿了從未發表過的高級安全技術和簡明的指導,解釋了如何防禦軟件和網絡基礎設施中的毀滅性漏洞。本書將詳細分析現代威脅及其解決方案,並在每章結尾提供開發防禦措施的檢查表。您還將介紹一種成功的自定義漏洞評估方法,包括攻擊概要和戰爭概念。通過對底層技術的深入解釋,您將學會為尚不存在的威脅做好網絡和軟件的準備。這是任何負責網絡安全的人必備的一本書。

目錄:
第一部分:安全專業人員的核心互聯網基礎設施
第1章:安全專業人員的互聯網基礎設施
第2章:ISP安全實踐:區分事實和虛構
第3章:保護域名系統
第二部分:保護您的邊界和關鍵互聯網基礎設施:今天的邊界不是昨天的邊界
第4章:可靠的連接
第5章:保護邊界
第6章:深入研究DMZ
第7章:入侵檢測和預防
第8章:遠程應用訪問和過濾
第9章:電子郵件閘道,過濾和冗余
第10章:數據洩露-利用出口
第11章:陷阱和回溯工具
第12章:保護無線網絡
第三部分:網絡漏洞評估:超越腳本小子:安全專業人員的工具和技術
第13章:專業人員錯過的公共信息(但攻擊者沒有錯過)
第14章:協調工具以進行最大限度的偵察
第15章:構建戰爭劇場-漏洞評估的成功方法
第16章:部署:攻擊/防禦
第四部分:您已被駭客入侵:接下來會發生什麼?
第17章:識別偵察和正在進行的攻擊
第18章:識別,遏制和緩解滲透
第19章:利用數字取證
第五部分:設計明天的威脅和對策
第20章:病毒,蠕蟲,特洛伊木馬和惡意軟件
第21章:利用軟件