Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / Edition 3

Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / Edition 3

ISBN-10:
0072263040
ISBN-13:
9780072263046
Pub. Date:
07/01/2006
Publisher:
McGraw Hill LLC
ISBN-10:
0072263040
ISBN-13:
9780072263046
Pub. Date:
07/01/2006
Publisher:
McGraw Hill LLC
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / Edition 3

Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / Edition 3

$64.0 Current price is , Original price is $64.0. You
$64.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


The stories about phishing attacks against banks are so true-to-life, it’s chilling.” —Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident—how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.


Product Details

ISBN-13: 9780072263046
Publisher: McGraw Hill LLC
Publication date: 07/01/2006
Edition description: REV
Pages: 400
Product dimensions: 7.30(w) x 9.00(h) x 0.84(d)

About the Author

Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge.

Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. At iSEC, Himanshu manages the firm’s product development efforts and co-manages the sales and marketing programs. Himanshu is also a renowned industry author with six security books published, including Mobile Application Security (McGraw Hill/Osborne), Hacking VoIP (No Starch Press), Hacking Exposed: Web 2.0 (McGraw Hill/Osborne), Hacker’s Challenge 3 (McGraw Hill/Osborne), Securing Storage (Addison Wesley), and Implementing SSH (Wiley). In addition to the books, Himanshu also has a patent pending on Fibre Channel security. Before starting iSEC Partners, Himanshu was the Regional Technical Director at @stake, Inc.

David Pollino has a strong background in security, wireless, and networking. David is currently a security practitioner working in financial services. During his career, he has worked for an industry-leading security consulting company, a large financial services company, and a tier 1 ISP. David often speaks at security events and has frequently been quoted in online and printed journals regarding security issues. During his career as a consultant and network engineer, David has worked for clients across multiple industries, including financial services, service providers, high technology, manufacturing, and government. He co-authored Wireless Security (RSA Press, 2002) and Hacker's Challenge and Hacker's Challenge 2 (McGraw-Hill/Osborne, 2001 and 2002, respectively).

Bill Pennington, CISSP, has six years of professional experience in information security and eleven years in information technology. His duties at WhiteHat include managing research and development, guiding product and technology direction, managing web application assessment teams, and developing and delivering WhiteHat Security training. Bill has performed web application assessments for more than four years in a variety of industry verticals including financial services, e-commerce, and biotechnology. He is familiar with Mac OS X, Linux, Solaris, Windows, and OpenBSD, and he is a Certified Information Security Systems Practitioner (CISSP) and Certified Cisco Network Administrator (CCNA). He has broad experience in web application security, penetration testing, computer forensics, and intrusion detection systems. Prior to joining WhiteHat, Bill was a principal consultant and technical lead for assessment services at Guardent, a nationwide security services provider.

Tony Bradley, CISSP-ISSAP, MCSE2k, has eight years of computer networking and administration experience, focusing the last four on network security and malware protection. Tony is a network security architect providing design, implementation, and management of network security solutions for a variety of Fortune 500 customers. He is also the editor and writer for the About.com Internet/Network Security website and frequently contributes to a variety of technical and security publications, both in print and on the Web. You can view his writing portfolio at http://www.s3kur3.com.

Himanshu Dwivedi is a founding partner of iSEC Partners, an independent provider of information security services and tools. He has 12 years of experience in security and IT. Before forming iSEC, he was Technical Director for @stake's Bay Area security practice. Himanshu's professional focus includes strategic security services, which leverages his experience with software development, infrastructure security, application security, tool development, and secure product design. He is considered an industry expert in storage security, specifically Fibre Channel/iSCSI SANs and CIFS/NFS NAS systems. Himanshu has presented at major security conferences throughout the world, including Black Hat, Storage Networking World, Syscan Singapore, and Bellua Indonesia. Himanshu also has a patent pending for a storage security design architecture that can be implemented on enterprise storage products for Fibre Channel networks. Himanshu has also authored two additional security books, including Securing Storage: A Practical Guide to SAN and NAS Security (Addison-Wesley, 2005) and Implementing SSH: Strategies for Optimizing the Secure Shell (Wiley, 2003).

Table of Contents

FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
Part I: Challenges

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects
Part II: Solutions

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects
INDEX
From the B&N Reads Blog

Customer Reviews