Security Warrior

( 2 )

Overview

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering...

See more details below
Other sellers (Paperback)
  • All (42) from $1.99   
  • New (9) from $25.23   
  • Used (33) from $1.99   
Security Warrior

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines — trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf—and in your hands.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
The “black hats” have taken their game to the next level. Experienced security professionals need to do likewise. That’s where Security Warrior comes in. Here’s the stuff everyone else will be scrambling to learn a year from now.

For example, Cyrus Peikari and Anton Chuvakin focus heavily on reverse code engineering for leading OS platforms and embedded devices. How do crackers identify potential software vulnerabilities? How can you beat them to the punch?

You’ll find systematic coverage of network stalking -- including the newest anti-forensics and IDS evasion techniques. There’s a full section on platform attacks: Linux, Windows, and mobile (including today’s newest “airborne viruses”). The authors wrap up with state-of-the-art defense -- from audit trail analysis to effective IDS placement. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Library Journal
Network security assessment (see also Computer Media, LJ 8/03) involves identifying vulnerabilities so that they can be minimized, and these guides address the topic from varying perspectives. Case Studies delves into implementing the framework of network security standards (IAM, or Information Assurance Methodology) defined by the U.S. National Security Agency (NSA), while Network Security Assessment focuses partially on NSA IAM and partially on the UK's Government Communication Headquarters (GCHQ) security framework, CESG (Communications and Electronics Security Group) CHECK. Case Studies' checklists, case studies, and sample templates create a practical and useful guide for firms that provide security assessments, individuals who have taken an IAM class, and organizations conducting security audits. A nice overview of an often-confusing topic, moving from the security contract stage through final reporting and follow-up. Network Security Assessment's broader coverage-as well as its step-by-step discussion of security risks and how to combat or minimize them-makes it a good choice for those addressing security issues in general. Its take on multiple services and operating systems, and its real-world examples create a comprehensive, useful guide. Both are appropriate for larger libraries; buy McNab's if you can afford only one. For advanced administrators and security experts, Warrior addresses security assessment in general. It focuses most heavily, however, on the topic of reverse engineering, or of disassembling applications to see what is going on at their lowest levels. This allows administrators to dissect malware and spyware in order to disinfect and secure their systems more effectively. Its coverage of multiple environments and tools and the overview of attacks from a cracker's perspective make this an appropriate purchase for larger libraries. Copyright 2004 Reed Business Information.
Read More Show Less

Product Details

  • ISBN-13: 9780596005450
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 2/28/2004
  • Edition number: 1
  • Pages: 556
  • Sales rank: 879,922
  • Product dimensions: 7.00 (w) x 9.19 (h) x 0.98 (d)

Meet the Author

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Read More Show Less

Table of Contents

Dedication

Preface

Part I: Software Cracking

Chapter 1: Assembly Language

Chapter 2: Windows Reverse Engineering

Chapter 3: Linux Reverse Engineering

Chapter 4: Windows CE Reverse Engineering

Chapter 5: Overflow Attacks

Part II: Network Stalking

Chapter 6: TCP/IP Analysis

Chapter 7: Social Engineering

Chapter 8: Reconnaissance

Chapter 9: OS Fingerprinting

Chapter 10: Hiding the Tracks

Part III: Platform Attacks

Chapter 11: Unix Defense

Chapter 12: Unix Attacks

Chapter 13: Windows Client Attacks

Chapter 14: Windows Server Attacks

Chapter 15: SOAP XML Web Services Security

Chapter 16: SQL Injection

Chapter 17: Wireless Security

Part IV: Advanced Defense

Chapter 18: Audit Trail Analysis

Chapter 19: Intrusion Detection Systems

Chapter 20: Honeypots

Chapter 21: Incident Response

Chapter 22: Forensics and Antiforensics

Part V: Appendix

Appendix A: Useful SoftICE Commands and Breakpoints

Colophon

Read More Show Less

Customer Reviews

Average Rating 4.5
( 2 )
Rating Distribution

5 Star

(1)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted April 22, 2004

    Eye-opening

    The whole concept of this book is: know your enemy. If you are a software developer or systems administrator, something you touch is bound to be attacked. Software developers need to understand this when writing programs. Likewise, systems administrators must protect their system from outside attack. This book proceeds from the premise that attack is inevitable, but we are more effective in dealing with it if we know the tactics of hackers. As we understand how they think and act, it helps us write and maintain a higher level of security within applications or network infrastructure. This book is very interesting to read and amazing to see how easy it is to ¿hack¿ various kinds of applications with just a few tools. The book discusses the basics of reverse engineering on Windows, Linux, and Pocket PC. Additionally, the authors step through a couple of examples, to show just how easy it is to bypass entering a serial number in a software install. Other ¿hacks¿ shows include buffer overflow, TCP/IP, SQL injection attacks, and even social engineering. I would recommend this book to anyone interested in any kind of software or network security. It is very eye-opening to see just how easy it is to compromise a system. Once you know how your enemy attacks, you can proceed with ways to combat them.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 18, 2004

    Different Approach to Computer Security

    This book shows a different perspective on computer security, the perspective of the cracker trying to attack or invade your computer system or network. And why not? The best offense sometimes is a good defense. Among the topics this book talks about? It describes how you can 'reverse engineer' your own programs (In Windows 9X, XP, etc. UNIX and Linux) and also shows in some cases how easy it is for hackers and crackers to invade your computers and networks. And speaking of UNIX, this book also how easily UNIX boxes can be compromised, or how easily Windows machines can be (which given the recent news about another XP security hole, seems almost redundant for the book's authors to mention). It shows that even Linux can be quite insecure, proving that no OS is completely safe just that it may be safer than Unix or Windows. Just on these points alone, the book is an eye-opener. The chapters about 'reverse engineering' also made me think about how handheld devices like Palm Pilots can also be attacked and/or infected with virii or worms, once they are connected to the Internet. No computer device is truly immune. Among other chapters with good information? Ones about social engineering, attacks on various platforms (Unix, Windows Client & Windows Server, SQL and Wireless) and methods of defense against them. This book has a ton of outstanding information that may scare the heck out of security professionals, but is designed truly to inform. It offers security professionals new ways of defending against attacks and viruses.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)