Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist.
1131595509
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist.
61.0 In Stock
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Paperback

$61.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist.

Product Details

ISBN-13: 9780072259551
Publisher: McGraw-Hill Companies, The
Publication date: 07/18/2005
Series: Hacking Exposed S
Pages: 448
Product dimensions: 7.40(w) x 9.16(h) x 0.93(d)

About the Author

Victor Oppleman (Phoenix, AZ) is an accomplished author, speaker, and patent-holder in the field of network security and a specialized consultant to some of the world’s most admired companies. Mr. Oppleman’s open source software is used by thousands of engineers worldwide and some of the largest global companies call upon Mr. Oppleman to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security.

Oliver Friedrichs(Woodside, CA) is a Senior Manager in Symantec Security Response, the organization responsible for the delivery of AntiVirus definitions, intrusion detection updates, and early warning technologies within Symantec. Mr. Friedrichs also co-founded securityfocus.com and Secure Networks and has shared his expertise with many of the world’s most powerful organizations, including the U.S. Department of Homeland Security, U.S. Secret Service, the IRS, the DOD, NASA, AFOSI, and the Canadian DND.

Brett Watson (Phoenix, AZ) has 17 years experience in networks and security, including large-scale IP networking, optical networking, and security and vulnerability assessments for some of the world’s largest Internet Service Providers and enterprise networks. In addition, Mr. Watson holds a patent for one of the first large-scale content distribution platforms known as Hopscotch.

Table of Contents

Part 1: Core Internet Infrastructure for Security Professionals

Chapter 1: Internet Infrastructure for Security Professionals

Chapter 2: ISP Security Practices: Separating Fact From Fiction

Chapter 3: Securing the Domain Name System

Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter

Chapter 4: Reliable Connectivity

Chapter 5: Securing the Perimeter

Chapter 6: DMZs In-Depth

Chapter 7: Intrusion Detection and Prevention

Chapter 8: Remote Application Access and Filtering

Chapter 9: E-Mail Gateways, Filtering, and Redundancy

Chapter 10: Data Leaks -- Exploiting Egress

Chapter 11: Sinkhole and Backscatter Tools

Chapter 12: Securing Wireless Networks

Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals

Chapter 13: Public Information that Pro's Miss (but attackers don't)

Chapter 14: Coordination of Tools for Maximum Recon

Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments

Chapter 16: Deploy: ATTACK / DEFEND

Part 4: You've been hacked: What comes next?

Chapter 17: Identifying Recon and Attacks in Progress

Chapter 18: Identifying, Containing, and Mitigating the Infiltration

Chapter 19: Exploiting Digital Forensics

Part 5: Designing New Threats and Countermeasures for Tomorrow

Chapter 20: Viruses, Worms, Trojans, and Malware

Chapter 21: Exploiting Software

From the B&N Reads Blog

Customer Reviews