Hacking: Hacking Firewalls & Bypassing Honeypots
The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work.
1135258695
Hacking: Hacking Firewalls & Bypassing Honeypots
The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work.
37.0 In Stock
Hacking: Hacking Firewalls & Bypassing Honeypots

Hacking: Hacking Firewalls & Bypassing Honeypots

by Alex Wagner
Hacking: Hacking Firewalls & Bypassing Honeypots

Hacking: Hacking Firewalls & Bypassing Honeypots

by Alex Wagner

Hardcover

$37.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work.

Product Details

ISBN-13: 9781839381171
Publisher: Sabi Shepherd Ltd
Publication date: 08/15/2019
Series: Hacking Firewalls & Bypassing Honeypots
Pages: 212
Product dimensions: 6.00(w) x 9.00(h) x 0.50(d)

Table of Contents

Guardians of Peace VS Sony Pictures

Chapter 0.1 The OSI Model

Chapter 1 Do We Need Firewalls?

Chapter 2 Zone Based Firewalls

Chapter 3 Firewall Behavior and TCP State Table

Chapter 4 Network Address Translation

Chapter 5 Port Address Translation

Chapter 6 Demilitarized Zone

Chapter 7 TCP & UDP Traffic on Firewalls

Chapter 8 Client Connection

Chapter 9 System Intrusion Indicators

Chapter 10 Indicators of Network Intrusion

Chapter 11 Anomalous Behaviour

Chapter 12 Firewall Types

Chapter 13 Firewall Implementations

Chapter 14 Firewall Architectures

Chapter 15 Packet Filtering Firewalls

Chapter 16 Circuit-level Gateway

Chapter 17 Application Firewalls

Chapter 18 Stateful Firewalls

Chapter 19 Next-Gen Firewalls

Chapter 20 Detecting Firewalls

Chapter 21 IP address spoofing

Chapter 22 Source Routing

Chapter 23 Tiny fragment attack

Chapter 24 Tunneling

Chapter 25 Evasion Tools

Chapter 26 Intrusion Detection Systems

Chapter 27 Signature-based IDS

Chapter 28 Statistical Anomaly-based IDS

Chapter 29 Network-Based IDS

Chapter 30 Host Intrusion Detection System

Chapter 31 Other Classes of IDS

Chapter 32 Evasion by Confusion

Chapter 33 Fragmentation attack

Chapter 34 Overlapping Fragments Attack

Chapter 35 Time-to-Live attack

Chapter 36 DoS Attack & Flooding Attack

Chapter 37 IDS weakness

Chapter 38 Honeypots

Chapter 39 Honeypot Types

Chapter 40 Canary

Chapter 41 Honeypot Detection

Supplementary Resources

Conclusion

About the Author

From the B&N Reads Blog

Customer Reviews