Hacker's Challenge 2: Test Your Network Security & Forensic Skills, 2/e
Mike Schiffman, Bill Pennington, David Pollino, Adam J. O'Donnell
- 出版商: McGraw-Hill Education
- 出版日期: 2002-12-18
- 售價: $1,580
- 貴賓價: 9.5 折 $1,501
- 語言: 英文
- 頁數: 352
- 裝訂: Paperback
- ISBN: 0072226307
- ISBN-13: 9780072226300
-
相關分類:
資訊安全、駭客 Hack
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$686Introduction to the Theory of Computation
-
$780$616 -
$1,150$1,127 -
$490$417 -
$800$632 -
$2,340$2,223 -
$1,860$1,767 -
$1,650$1,568 -
$1,890$1,796 -
$620$558 -
$750$638 -
$580$458 -
$650$553 -
$580$458 -
$760$600 -
$580$458 -
$590$466 -
$280$221 -
$520$411 -
$750$675 -
$560$504 -
$1,078Machine Learning (IE-Paperback)
-
$480$408 -
$399Hacking Exposed Computer Forensics (Paperback)
-
$1,485Forensic Discovery (Hardcover)
相關主題
商品描述
Awesome....Incredibly informative, insightful, as well as a lot of fun to read. Recommended for anyone who values the integrity and security of their network. --Shawn Bracken, Principal Research Engineer, Cenzic, Inc.
Do you have what it takes to keep hackers out of your network? This unique volume tests your computer forensics and response skills with 20 brand-new, real-life security incidents as told by top-tier security experts. In an entertaining and informative style, this book addresses key security topics, including Denial of Service, malicious code, Web application attacks, wireless technologies, insider and outsider attacks, and more. Each challenge unfolds like a chapter from a novel and includes details of the incident--how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. In Part II, youll find a detailed explanation of exactly what was happening in each incident and the answers to the questioned posed in Part I, along with prevention and mitigation techniques.
Excerpt from One Thing Leads to Another:
The Challenge: John is the I.T. Manager for a movie company working on the special effects for a hit film.... But the fan site has just posted an unauthorized clip of one of the most anticipated scenes in the movie.... A postproduction team member put the clip on the server but no one accessed it after that, at least not via FTP.... Then it happened again: more footage was released.... The Web master of the fan site supplied the e-mail address from which he received the files. John checked the ssh logs and the Web server logs.... He found an IP address he had not seen before.... He pinged the IP address then checked his arp table to get the machines MAC address.... He began tracing the cable back to its source: the proxy server, which had not been used in 8 months....
The Solution: After reviewing the log files included in the challenge, propose your assessment: How could the employees have approached the initial investigation differently that may have helped them get to the culprit sooner? What does the lack of evidence in the ftp and ssh logs reveal? Was Johns method of tracking down the proxy server the best method? What is the best solution to solve the vulnerability? Then, turn to the experts answers to find out what really happened.
Contents
Ch. 1: Dont Tell Mom my Software is
Insecure
Ch. 2: The Man with One Red
Antenna
Ch. 3: The Postman Always Sends Extra Long
Filenames
Ch. 4: Clicks
Ch. 5:
Kids
Ch. 6: One Thing Leads to
Another
Ch. 7: When a Stranger
Calls
Ch. 8: The Insider, Part
Deux
Ch. 9: A Long Hard Road out of
Shell
Ch. 10: All you Zombies
Ch.
11: Forced Byzantine Failure
Ch. 12: Off the Beaten
Path
Ch. 13: My Cup Runneth Over
Ch.
14: Freeloader
Ch. 15: Do I know you?
Ch. 16: Tunnel of Love
商品描述(中文翻譯)
精彩……內容極具資訊性和洞察力,閱讀起來也非常有趣。推薦給任何重視其網路完整性和安全性的人。——Shawn Bracken,Cenzic, Inc. 首席研究工程師。
你有能力阻止駭客入侵你的網路嗎?這本獨特的書籍透過20個全新的真實安全事件,考驗你的電腦取證和應對技能,這些事件由頂尖的安全專家講述。以娛樂性和資訊性兼具的風格,本書探討了關鍵的安全主題,包括拒絕服務攻擊、惡意程式碼、網路應用攻擊、無線技術、內部和外部攻擊等。每個挑戰都像小說中的一章,包含事件的詳細資訊——如何發現入侵、證據,以及如日誌檔和網路圖等背景資料——並隨後附上你需要解決的一系列問題。在第二部分,你將找到每個事件發生時的詳細解釋,以及第一部分提出問題的答案,還有預防和緩解技術。
摘錄自《一件事引發另一件事》:
挑戰:John是某電影公司的IT經理,負責一部熱門電影的特效……但粉絲網站剛剛發布了一段未經授權的片段,這是電影中最受期待的場景之一……一名後期製作團隊成員將片段放在伺服器上,但之後沒有人再訪問它,至少不是透過FTP……然後又發生了:更多的畫面被釋放……粉絲網站的網頁管理員提供了他收到檔案的電子郵件地址。John檢查了ssh日誌和網頁伺服器日誌……他發現了一個他之前未見過的IP地址……他對該IP地址進行了ping測試,然後檢查了他的arp表以獲取該機器的MAC地址……他開始追蹤電纜回到其來源:代理伺服器,這台伺服器已經8個月未使用……
解決方案:在檢查挑戰中包含的日誌檔後,提出你的評估:員工們在初步調查中可以如何不同地進行,可能會幫助他們更快找到罪犯?FTP和SSH日誌中缺乏證據揭示了什麼?John追蹤代理伺服器的方法是最佳方法嗎?解決這一漏洞的最佳方案是什麼?然後,轉向專家的答案,了解實際發生了什麼。
目錄:
第1章:別告訴媽媽我的軟體不安全
第2章:擁有一根紅色天線的人
第3章:郵差總是發送超長檔名
第4章:點擊
第5章:孩子們
第6章:一件事引發另一件事
第7章:陌生人來電
第8章:內部人,第二部分
第9章:走出Shell的漫長艱辛之路
第10章:所有的殭屍
第11章:強迫的拜占庭失敗
第12章:不走尋常路
第13章:我的杯子滿溢
第14章:搭便車者
第15章:我認識你嗎?
第16章:愛的隧道