buchspektrum Internet-Buchhandlung

Neuerscheinungen 2012

Stand: 2020-01-07
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

George Kurtz, Stuart MacClure, Stuart McClure, Joel Scambray (Beteiligte)

Hacking Exposed 7


Network Security Secrets & Solutions
7th ed. 2012. 768 S. w. figs. 231.1 mm
Verlag/Jahr: MCGRAW-HILL PROFESSIONAL; MCGRAW-HILL OSBORNE 2012
ISBN: 0-07-178028-9 (0071780289)
Neue ISBN: 978-0-07-178028-5 (9780071780285)

Preis und Lieferzeit: Bitte klicken


This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach
The latest tactics for thwarting digital attacks
"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerīs mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment
"Stop taking punches--letīs change the game; itīs time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI
Bolster your systemīs security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hackerīs latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook."

Obstruct APTs and web-based meta-exploits
Defend against UNIX-based root access and buffer overflow hacks
Block SQL injection, spear phishing, and embedded-code attacks
Detect and terminate rootkits, Trojans, bots, worms, and malware
Lock down remote access using smartcards and hardware tokens
Protect 802.11 WLANs with multilayered encryption and gateways
Plug holes in VoIP, social networking, cloud, and Web 2.0 services
Learn about the latest iPhone and Android attacks and how to protect yourself
1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks