Hacker's Challenge 3 - David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi

Hacker's Challenge 3

Buch | Softcover
400 Seiten
2006 | 3rd edition
Osborne/McGraw-Hill (Verlag)
978-0-07-226304-6 (ISBN)
57,35 inkl. MwSt
Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life security incidents that test computer forensics and response skills. It covers security topics like phishing and pharming scams, internal corporate hacking, Cisco IOS hacks, wireless hacks, VoIP hacks, Windows, and Mac OS X.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider. Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge. Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. At iSEC, Himanshu manages the firm’s product development efforts and co-manages the sales and marketing programs. Himanshu is also a renowned industry author with six security books published, including Mobile Application Security (McGraw Hill/Osborne), Hacking VoIP (No Starch Press), Hacking Exposed: Web 2.0 (McGraw Hill/Osborne), Hacker’s Challenge 3 (McGraw Hill/Osborne), Securing Storage (Addison Wesley), and Implementing SSH (Wiley). In addition to the books, Himanshu also has a patent pending on Fibre Channel security. Before starting iSEC Partners, Himanshu was the Regional Technical Director at @stake, Inc.

FOREWORDACKNOWLEDGMENTSINTRODUCTIONPart I: ChallengesChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX

Erscheint lt. Verlag 16.6.2006
Zusatzinfo 100 Illustrations, unspecified
Verlagsort New York
Sprache englisch
Maße 185 x 229 mm
Gewicht 690 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-226304-0 / 0072263040
ISBN-13 978-0-07-226304-6 / 9780072263046
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich