Fr. 106.00

Hacking exposed cisco networks

Anglais · Livre Broché

Expédition généralement dans un délai de 3 à 5 semaines

Description

En savoir plus

Informationen zum Autor McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide Klappentext Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. > >Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies. Zusammenfassung First to market! This is the only book focusing solely on Cisco network hacking! security auditing and defense issues. Inhaltsverzeichnis Foreword; Introduction; Part I: Foundations; Chapter 1: Cisco Networking and Security Models Overview; Chapter 2: Real World Cisco Security Issues; Part II: "I am Enabled:" Hacking the Box; Case Study 1: Wrestling for Enable; Case Study 2: Dude! Where is My Money!; Chapter 3: Profiling and Enumerating Cisco Devices; Chapter 4: Getting in From the Outside; Chapter 5: Preserving and Exploiting Access; Chapter 6: Denial of Service Attacks Against Cisco Devices; Part III: Protocol Exploitation in Cisco Networking Environments; Case Study 3: The Labyrinth of Underground Tunnels; Case Study 4: The Flying OSPF Hell; Chapter 7: Hacking Cisco-based Networks; Chapter 8: Routing Protocols-specific Network Exploitation; Part IV: Appendices; Appendix A: Network Device Security Evaluation Template; Appendix B: Source Code of the Phenoelit Group Exploits. ...

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.