Fr. 50.90

Extreme Exploits - Advanced Defenses Against Hardcore Hacks

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications. Klappentext This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist. Inhaltsverzeichnis Part 1: Core Internet Infrastructure for Security ProfessionalsChapter 1: Internet Infrastructure for Security ProfessionalsChapter 2: ISP Security Practices: Separating Fact From FictionChapter 3: Securing the Domain Name SystemPart 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software...

List of contents










Part 1: Core Internet Infrastructure for Security Professionals

Chapter 1: Internet Infrastructure for Security Professionals

Chapter 2: ISP Security Practices: Separating Fact From Fiction

Chapter 3: Securing the Domain Name System

Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter

Chapter 4: Reliable Connectivity

Chapter 5: Securing the Perimeter

Chapter 6: DMZs In-Depth

Chapter 7: Intrusion Detection and Prevention

Chapter 8: Remote Application Access and Filtering

Chapter 9: E-Mail Gateways, Filtering, and Redundancy

Chapter 10: Data Leaks -- Exploiting Egress

Chapter 11: Sinkhole and Backscatter Tools

Chapter 12: Securing Wireless Networks

Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals

Chapter 13: Public Information that Pro's Miss (but attackers don't)

Chapter 14: Coordination of Tools for Maximum Recon

Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments

Chapter 16: Deploy: ATTACK / DEFEND

Part 4: You've been hacked: What comes next?

Chapter 17: Identifying Recon and Attacks in Progress

Chapter 18: Identifying, Containing, and Mitigating the Infiltration

Chapter 19: Exploiting Digital Forensics

Part 5: Designing New Threats and Countermeasures for Tomorrow

Chapter 20: Viruses, Worms, Trojans, and Malware

Chapter 21: Exploiting Software


About the author










Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications.


Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.