Hacking Exposed Cisco Networks - Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky

Hacking Exposed Cisco Networks

Buch | Softcover
400 Seiten
2006
Osborne/McGraw-Hill (Verlag)
978-0-07-225917-9 (ISBN)
79,80 inkl. MwSt
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

Foreword; Introduction; Part I: Foundations; Chapter 1: Cisco Networking and Security Models Overview; Chapter 2: Real World Cisco Security Issues; Part II: "I am Enabled:" Hacking the Box; Case Study 1: Wrestling for Enable; Case Study 2: Dude, Where is My Money!; Chapter 3: Profiling and Enumerating Cisco Devices; Chapter 4: Getting in From the Outside; Chapter 5: Preserving and Exploiting Access; Chapter 6: Denial of Service Attacks Against Cisco Devices; Part III: Protocol Exploitation in Cisco Networking Environments; Case Study 3: The Labyrinth of Underground Tunnels; Case Study 4: The Flying OSPF Hell; Chapter 7: Hacking Cisco-based Networks; Chapter 8: Routing Protocols-specific Network Exploitation; Part IV: Appendices; Appendix A: Network Device Security Evaluation Template; Appendix B: Source Code of the Phenoelit Group Exploits.

Erscheint lt. Verlag 16.1.2006
Zusatzinfo 50 Illustrations
Verlagsort New York
Sprache englisch
Maße 185 x 229 mm
Gewicht 1022 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-225917-5 / 0072259175
ISBN-13 978-0-07-225917-9 / 9780072259179
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
94,95