Hacker's Challenge 3, 3/e

David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi

  • 出版商: McGraw-Hill Education
  • 出版日期: 2006-05-16
  • 售價: $1,928
  • 貴賓價: 9.5$1,832
  • 語言: 英文
  • 頁數: 400
  • 裝訂: Paperback
  • ISBN: 0072263040
  • ISBN-13: 9780072263046
  • 相關分類: 駭客

下單後立即進貨 (2~3週)

買這商品的人也買了...

商品描述

Description   

The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

 

Table of Contents

FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
Part I: Challenges
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX