Share
Fr. 50.90
O. Friedrichs, Friedrichs Oliver, V. Oppleman, Oppleman Victor, B. Watson, Watson Brett
Extreme Exploits - Advanced Defenses Against Hardcore Hacks
English · Paperback / Softback
Shipping usually within 3 to 5 weeks
Description
Informationen zum Autor Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications. Klappentext This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist. Inhaltsverzeichnis Part 1: Core Internet Infrastructure for Security ProfessionalsChapter 1: Internet Infrastructure for Security ProfessionalsChapter 2: ISP Security Practices: Separating Fact From FictionChapter 3: Securing the Domain Name SystemPart 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software...
List of contents
Part 1: Core Internet Infrastructure for Security ProfessionalsChapter 1: Internet Infrastructure for Security ProfessionalsChapter 2: ISP Security Practices: Separating Fact From FictionChapter 3: Securing the Domain Name SystemPart 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 2: ISP Security Practices: Separating Fact From FictionChapter 3: Securing the Domain Name SystemPart 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
Chapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software
About the author
About the author
Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications.
Product details
| Authors | O. Friedrichs, Friedrichs Oliver, V. Oppleman, Oppleman Victor, B. Watson, Watson Brett |
| Publisher | Osborne mcgraw-hill |
| Languages | English |
| Product format | Paperback / Softback |
| Released | 15.08.2005 |
| EAN | 9780072259551 |
| ISBN | 978-0-07-225955-1 |
| Dimensions | 188 mm x 231 mm x 21 mm |
| Series |
Hacking Exposed |
| Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
Datensicherheit (EDV), JUVENILE NONFICTION / Computers / General, Educational: IT and computing, ICT, Educational: IT & computing, ICT, COMPUTERS / Security / Cryptography & Encryption |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.