Extreme Exploits : Advanced Defenses Against Hardcore Hacks
Victor Oppleman, Oliver Friedrichs, Brett Watson
- 出版商: McGraw-Hill Education
- 出版日期: 2005-07-18
- 定價: $1,700
- 售價: 5.0 折 $850
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 0072259558
- ISBN-13: 9780072259551
-
相關分類:
資訊安全
立即出貨 (庫存 < 4)
買這商品的人也買了...
-
$680$578 -
$1,200$1,176 -
$1,176Database Management Systems, 3/e (IE-Paperback)
-
$3,420Agile Software Development: Principles, Patterns, and Practices (Hardcover)
-
$780CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
-
$590$466 -
$590$466 -
$560$504 -
$2,010$1,910 -
$650$507 -
$199$155 -
$550$468 -
$880$748 -
$820$697 -
$550$495 -
$650$507 -
$1,188Core C# and .NET (Paperback)
-
$480$408 -
$580$493 -
$780$616 -
$680$578 -
$480$408 -
$450$383 -
$450$351 -
$580$493
相關主題
商品描述
Description:
Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You’ll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you’ll learn to prepare your network and software from threats that don’t yet exist. This is a must-have volume for anyone responsible for network security.
Table of Contents:
Part 1: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact From Fiction
Chapter 3: Securing the Domain Name System
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter
Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: Remote Application Access and Filtering
Chapter 9: E-Mail Gateways, Filtering, and Redundancy
Chapter 10: Data Leaks -- Exploiting Egress
Chapter 11: Sinkhole and Backscatter Tools
Chapter 12: Securing Wireless Networks
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals
Chapter 13: Public Information that Pro's Miss (but attackers don't)
Chapter 14: Coordination of Tools for Maximum Recon
Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments
Chapter 16: Deploy: ATTACK / DEFEND
Part 4: You've been hacked: What comes next?
Chapter 17: Identifying Recon and Attacks in Progress
Chapter 18: Identifying, Containing, and Mitigating the Infiltration
Chapter 19: Exploiting Digital Forensics
Part 5: Designing New Threats and Countermeasures for Tomorrow
Chapter 20: Viruses, Worms, Trojans, and Malware
Chapter 21: Exploiting Software
商品描述(中文翻譯)
描述:
保護您的網絡和網站免受惡意攻擊,請參考這本尖端指南。《極限攻擊》充滿了從未發表過的高級安全技術和簡明的指導,解釋了如何防禦軟件和網絡基礎設施中的毀滅性漏洞。本書將詳細分析現代威脅及其解決方案,並在每章結尾提供開發防禦措施的檢查表。您還將介紹一種成功的自定義漏洞評估方法,包括攻擊概要和戰爭概念。通過對底層技術的深入解釋,您將學會為尚不存在的威脅做好網絡和軟件的準備。這是任何負責網絡安全的人必備的一本書。
目錄:
第一部分:安全專業人員的核心互聯網基礎設施
第1章:安全專業人員的互聯網基礎設施
第2章:ISP安全實踐:區分事實和虛構
第3章:保護域名系統
第二部分:保護您的邊界和關鍵互聯網基礎設施:今天的邊界不是昨天的邊界
第4章:可靠的連接
第5章:保護邊界
第6章:深入研究DMZ
第7章:入侵檢測和預防
第8章:遠程應用訪問和過濾
第9章:電子郵件閘道,過濾和冗余
第10章:數據洩露-利用出口
第11章:陷阱和回溯工具
第12章:保護無線網絡
第三部分:網絡漏洞評估:超越腳本小子:安全專業人員的工具和技術
第13章:專業人員錯過的公共信息(但攻擊者沒有錯過)
第14章:協調工具以進行最大限度的偵察
第15章:構建戰爭劇場-漏洞評估的成功方法
第16章:部署:攻擊/防禦
第四部分:您已被駭客入侵:接下來會發生什麼?
第17章:識別偵察和正在進行的攻擊
第18章:識別,遏制和緩解滲透
第19章:利用數字取證
第五部分:設計明天的威脅和對策
第20章:病毒,蠕蟲,特洛伊木馬和惡意軟件
第21章:利用軟件