Extreme Exploits: Advanced Defenses Against Hardcore Hacks - Victor Oppleman, Oliver Friedrichs, Brett Watson

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Buch | Softcover
448 Seiten
2005
McGraw-Hill Professional (Verlag)
978-0-07-225955-1 (ISBN)
36,15 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Explains how to defend against vulnerabilities in systems and underlying network infrastructure. This book features advanced methodologies that include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, it helps readers architect and prepare their network from threats that don't yet exist.
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis’ databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.

Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications. Oliver Friedrichs is a Senior Manager in Symantec Security Response, the organization responsible for the delivery of AntiVirus definitions, intrusion detection updates, and early warning technologies within Symantec. Mr. Friedrichs served as co-founder and Director of Engineering at SecurityFocus until the companys acquisition by Symantec in 2002. At SecurityFocus, Mr. Friedrichs managed the development of the industrys first early warning technology for Internet attacks, the DeepSight Threat Management System. Mr. Friedrichs also created and grew the DeepSight Threat Analyst team providing thorough analysis of emerging Internet threats. Prior to SecurityFocus, he served as co-founder and Vice President of Engineering at Secure Networks, Inc., which was acquired by Network Associates in 1998. At Secure Networks, Friedrichs architected and managed the development of Ballista network security auditing software, later rebranded CyberCop Scanner by Network Associates. At Network Associates Mr. Friedrichs also founded COVERT (Computer Vulnerability Exploitation Research Team) with the exclusive goal of researching and discovering new security vulnerabilities. Mr. Friedrichs also architected and developed a prototype of the industrys first commercial penetration testing product, CORE Impact, developed and sold by CORE Security Technologies. Mr. Friedrichs has over 13 years of expertise in security technologies, including network assessment, intrusion detection systems, firewalls, penetration testing, and honeypots. As a frequent speaker, he has shared his expertise with many of the worlds most powerful organizations, including the Department of Homeland Security, U.S. Secret Service, the IRS, the DOD, NASA, AFOSI, and the Canadian DND. Brett has 17 years experience in network architecture and security, including large-scale IP networking, optical networking, and security and vulnerability assessments. Brett helped deploy and maintain the original MCI and Genuity IP backbones, and designed the first metropolitan IP-over-Gigibit Ethernet product for Metromedia Fiber Networks. Brett has spent the last three years performing custom network and vulnerability assessments, and consulting on information security issues for some of the largest healthcare, water, and power industries in the United States. In addition, Brett holds a patent for one of the first large-scale, content distribution platforms known as Hopscotch.

Part 1: Core Internet Infrastructure for Security ProfessionalsChapter 1: Internet Infrastructure for Security ProfessionalsChapter 2: ISP Security Practices: Separating Fact From FictionChapter 3: Securing the Domain Name SystemPart 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's PerimeterChapter 4: Reliable ConnectivityChapter 5: Securing the PerimeterChapter 6: DMZs In-DepthChapter 7: Intrusion Detection and PreventionChapter 8: Remote Application Access and FilteringChapter 9: E-Mail Gateways, Filtering, and RedundancyChapter 10: Data Leaks -- Exploiting EgressChapter 11: Sinkhole and Backscatter ToolsChapter 12: Securing Wireless NetworksPart 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security ProfessionalsChapter 13: Public Information that Pro's Miss (but attackers don't)Chapter 14: Coordination of Tools for Maximum ReconChapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability AssessmentsChapter 16: Deploy: ATTACK / DEFENDPart 4: You've been hacked: What comes next?Chapter 17: Identifying Recon and Attacks in ProgressChapter 18: Identifying, Containing, and Mitigating the InfiltrationChapter 19: Exploiting Digital ForensicsPart 5: Designing New Threats and Countermeasures for TomorrowChapter 20: Viruses, Worms, Trojans, and MalwareChapter 21: Exploiting Software

Erscheint lt. Verlag 16.8.2005
Reihe/Serie Hacking Exposed
Zusatzinfo 1, black & white illustrations
Sprache englisch
Themenwelt Schulbuch / Wörterbuch
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
Schlagworte Internet-Security
ISBN-10 0-07-225955-8 / 0072259558
ISBN-13 978-0-07-225955-1 / 9780072259551
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich