Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Overview

Do you have what it takes to keep the bad guys out of your network? Find out with the latest edition of this best-selling book featuring 20+ all new hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.

Read More Show Less
... See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (21) from $1.99   
  • New (2) from $115.00   
  • Used (19) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$115.00
Seller since 2014

Feedback rating:

(139)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$125.00
Seller since 2014

Feedback rating:

(139)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Do you have what it takes to keep the bad guys out of your network? Find out with the latest edition of this best-selling book featuring 20+ all new hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
How many of the 19 Hacker's Challenges in this book can you handle?

You'll get the same evidence you'd see as a network administrator facing an attack in progress, or the entrails of an attack that's already taken place. Then, the challenge: What's really going on here? What is its significance? What can you do about it?

Once you've had time to mull things over, the authors provide detailed solutions to each challenge question -- as well as practical techniques for preventing and mitigating similar attacks.

Thousands of netadmins honed their network security and forensic chops on the first edition of Hacker's Challenge. This edition is entirely new, with all new exploits. The challenges run the gamut of contemporary network security problems, from defaced home pages to hijacked emails, "man in the middle attacks" to wireless network intrusions.

Like this: You get an email stating that your customer credit card database has been hacked and demanding $150,000. You get the firewall and database firewall rules, the complete email headers, network diagrams, database and web server log files. How did it happen? How could you tell?

We’ve seen plenty of excellent network and Internet security books by now. But these Hacker’s Challenge books are uniquely capable of bringing the subject to life. If you’re responsible for protecting a network, this book will show you how good you really are -- and how to get better, fast. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.

From The Critics
Slashdot.org
This is a great book for seeing not just what attacks are out there, but what attacks people in the security industry think are likely in the real world.… The format is easy to read and the real-world problem scenarios presented are interesting enough to keep you reading. The solutions are well presented and thorough, covering not just what happened in the attack and how to put the course of events together from the clues, but also ways to prevent and mitigate the attacks.… I definitely recommend Hacker's Challenge 2 to anyone interested in, or responsible for, computer security.
Read More Show Less

Product Details

  • ISBN-13: 9780072226300
  • Publisher: McGraw-Hill Companies,Inc.
  • Publication date: 12/18/2002
  • Series: Security Series
  • Edition number: 2
  • Pages: 352
  • Product dimensions: 7.30 (w) x 9.10 (h) x 0.83 (d)

Meet the Author

Mike Schiffman, CISSP, has been involved in most every technical arena computer security has to offer. He has researched and developed many cutting edge technologies including tools such as firewalk and tracerx as well as the ubiquitously used low-level packet shaping library libnet. Mike has led audit teams through engagements for fortune 500 companies in the banking, automotive and manufacturing industries. He has spoken in front of several institutions and government agencies such as: NSA, CIA, DOD, AFWIC, SAIC, and army intelligence. Mike is the lead author of Hacker’s Challenge, and has written for numerous technical journals such as Software Magazine and has written articles for securityfocus.com, and authored many security white papers. Currently, Mike is the Director of Security Architecture for @stake, the leading provider of professional security services. Previous to @stake, Mike was the Director of Research and Development for Guardent, Inc.

Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge.

David Pollino Director of the Wireless Center of Excellence at @stake, Inc., conducts leading research into wireless security issues. He is a respected information security consultant with an extensive networking background. His wireless and network security expertise is published in magazines and books. David speaks on security issues at several industry events. David was a contributing author to several chapters of the original Hacker’s Challenge.

Read More Show Less

Table of Contents

Acknowledgments
Introduction
Pt. I Challenges
1 Forced Byzantine Failure 3
2 Ssssh! Don't Tell Mom My Software Is Insecure 13
3 The Man with One Red Antenna 31
4 The Postman Always Sends Extra-Long Filenames 39
5 My Cup Runneth Over 49
6 The Kids Aren't Alright 57
7 Policy Predicament 67
8 When a Stranger Calls 75
9 How Bad Is It, Doc? 87
10 The Slippery NOP Slide 97
11 One Thing Leads to Another 111
12 The World Is Not Enough 119
13 You Won't Know Who to Trust 125
14 The Freeloader 133
15 Tunnel of Love 151
16 "Do I Know You?" 163
17 Off the Beaten Path 173
18 Injection Indigestion 183
19 The Insider II 193
Pt. II Solutions
1 Forced Byzantine Failure 203
2 Ssssh! Don't Tell Mom My Software Is Insecure 209
3 The Man with One Red Antenna 213
4 The Postman Always Sends Extra-Long Filenames 219
5 My Cup Runneth Over 223
6 The Kids Aren't Alright 229
7 Policy Predicament 235
8 When a Stranger Calls 239
9 How Bad Is It, Doc? 245
10 The Slippery NOP Slide 251
11 One Thing Leads to Another 259
12 The World Is Not Enough 263
13 You Won't Know Who to Trust 267
14 The Freeloader 277
15 Tunnel of Love 281
16 "Do I Know You?" 287
17 Off the Beaten Path 291
18 Injection Indigestion 297
19 The Insider II 303
App.: Online Resources 307
Index 311
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)