Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.

1006357529
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.

39.95 In Stock
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

by Michal Zalewski
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

by Michal Zalewski

Paperback

$39.95 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.


Product Details

ISBN-13: 9781593270469
Publisher: No Starch Press
Publication date: 04/28/2005
Pages: 312
Product dimensions: 7.10(w) x 9.24(h) x 0.85(d)

About the Author

Michal Zalewski is an internationally recognized information security expert with a long track record of delivering cutting-edge research. He is credited with discovering hundreds of notable security vulnerabilities and frequently appears on lists of the most influential security experts. He is the author of Silence on the Wire (No Starch Press), Google's "Browser Security Handbook," and numerous important research papers.

Table of Contents

  • Dedication
  • Foreword
  • Introduction
  • The Source
    • Chapter 1: I Can Hear You Typing
    • Chapter 2: Extra Efforts Never Go Unnoticed
    • Chapter 3: Ten Heads of the Hydra
    • Chapter 4: Working for the Common Good


  • Safe Harbor
    • Chapter 5: Blinkenlights
    • Chapter 6: Echoes of the Past
    • Chapter 7: Secure in Switched Networks
    • Chapter 8: Us versus Them


  • Out in the Wild
    • Chapter 9: Foreign Accent
    • Chapter 10: Advanced Sheep-Counting Strategies
    • Chapter 11: In Recognition of Anomalies
    • Chapter 12: Stack Data Leaks
    • Chapter 13: Smoke and Mirrors
    • Chapter 14: Client Identification: Papers, Please!
    • Chapter 15: The Benefits of Being a Victim


  • The Big Picture
    • Chapter 16: Parasitic Computing, or How Pennies Add Up
    • Chapter 17: Topology of the Network
    • Chapter 18: Watching the Void


  • Closing Words
  • Bibliographic Notes
  • Updates

From the B&N Reads Blog

Customer Reviews