Cyber Operations
Apress (Verlag)
978-1-4842-0458-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems.
Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site.
The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security.
Mike O’Leary is a professor at Towson University and the founding Director of the School of Emerging Technologies. He developed and teaches hands-on capstone courses in computer security for both undergraduate and graduate students. He has coached the Towson University Cyber Defense team to the finals of the National Collegiate Cyber Defense Competition in 2010, 2012, and 2014.
Chapter 1. System Setup
Chapter 2. Basic Offense
Chapter 3. Operational Awareness
Chapter 4. DNS & BIND
Chapter 5. Enumerating the Network
Chapter 6. Active Directory
Chapter 7. Attacking the Domain
Chapter 8. Logging
Chapter 9. Network Services
Chapter 10. Malware
Chapter 11. Apache and ModSecurity
Chapter 12. IIS and ModSecurity
Chapter 13. Web Attacks
Chapter 14. Firewalls
Chapter 15. MySQL
Chapter 16. Snort
Chapter 17. PHP
Chapter 18. Web Applications
Zusatzinfo | 172 Illustrations, color; 3 Illustrations, black and white; XXVIII, 744 p. 175 illus., 172 illus. in color. |
---|---|
Verlagsort | Berkley |
Sprache | englisch |
Maße | 178 x 254 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Netzwerke • Netzwerksicherheit |
ISBN-10 | 1-4842-0458-1 / 1484204581 |
ISBN-13 | 978-1-4842-0458-0 / 9781484204580 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich