Fr. 106.00

Hacking exposed cisco networks

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide Klappentext Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. > >Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies. Zusammenfassung First to market! This is the only book focusing solely on Cisco network hacking! security auditing and defense issues. Inhaltsverzeichnis Foreword; Introduction; Part I: Foundations; Chapter 1: Cisco Networking and Security Models Overview; Chapter 2: Real World Cisco Security Issues; Part II: "I am Enabled:" Hacking the Box; Case Study 1: Wrestling for Enable; Case Study 2: Dude! Where is My Money!; Chapter 3: Profiling and Enumerating Cisco Devices; Chapter 4: Getting in From the Outside; Chapter 5: Preserving and Exploiting Access; Chapter 6: Denial of Service Attacks Against Cisco Devices; Part III: Protocol Exploitation in Cisco Networking Environments; Case Study 3: The Labyrinth of Underground Tunnels; Case Study 4: The Flying OSPF Hell; Chapter 7: Hacking Cisco-based Networks; Chapter 8: Routing Protocols-specific Network Exploitation; Part IV: Appendices; Appendix A: Network Device Security Evaluation Template; Appendix B: Source Code of the Phenoelit Group Exploits. ...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.