Flylib.com
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Back Cover
Back Cover
About
Foreword
Introduction
Layout and Key Elements
About the Companion Web Site
Part I: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Basic Internet Services
Supplementary Internet Services
Security Questionnaire
A Checklist for Developing Defenses
Chapter 2: ISP Security Practices--Separating Fact from Fiction
Components of ISP Security
Exposing Weaknesses in ISP Security
Internet Routing--A Little Deeper
Routing Policy
ISP Acceptable Use Policy and Incident Response
A Checklist for Developing Defenses
Chapter 3: Securing the Domain Name System
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Part II: Defending Your Perimeter and Critical Internet Infrastructure
Chapter 4: Reliable Connectivity
Components of Reliable Connectivity
Exposing Weaknesses in Connectivity
Border Router Security
Internet Gateways and Multihoming
Backup of Critical Device Configurations
Bandwidth Utilization
Redundant and Spare Equipment
Geographic Distribution of Critical Systems
A Checklist for Developing Defenses
Chapter 5: Securing the Perimeter
The Network Firewall
Types of Firewall Technologies
Firewall Deployment
A Checklist for Developing Defenses
Chapter 6: Redefining the DMZ--Securing Critical Systems
Components of Defense-in-Depth
Exposing Weaknesses of DMZs
Stand-alone Systems in the DMZ
Reverse-Proxy Systems in the DMZ
A Checklist for Developing Defenses
Chapter 7: Intrusion Detection and Prevention
Network-Based Intrusion Detection
Host-Based Intrusion Prevention
Security Information Management
A Checklist for Developing Defenses
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Background and Function
Exposing Weaknesses: E-mail Abuse
MTAs
Relay Security and Blocking Lists
MTA E-mail Filtering
MTA Encryption
MTA Redundancy
RemoteClient E-mail Security
Public Notifications and Role Accounts
A Checklist for Developing Defenses
Chapter 9: Data Leaks--Exploiting Egress
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Chapter 10: Sinkholes and Backscatter
Background and Function
Using Sinkholes to Deploy Decoy Networks
Implementing Sinkholes to Defend Against DDoS Attacks (Blackhole Routing)
Backscatter and Tracebacks
A Checklist for Developing Defenses
Chapter 11: Securing Wireless Networks
Wireless History
Basic Wireless Security
Advanced Wireless Security
Bluetooth
The Wireless Jail
A Checklist for Developing Defenses
Part III: Network Vulnerability Assessments
Chapter 12: Vulnerability and Patch Management
Vulnerability Lifecycle
Discovery
Prioritization
Deployment
A Checklist for Developing Defenses
Chapter 13: A Winning Methodology for Vulnerability Assessments
Security vs. Functionality (A Business Justification)
Methodology
Assessment Logistics
A Checklist for Developing Defenses
Chapter 14: Performing the Assessment, Part I
Information Gathering
Mapping Your Theatre of War
A Checklist for Developing Defenses
Chapter 15: Performing the Assessment, Part II
Target Qualification
Attack Profiling
Attack
Defenses and Remediation Tools
Our Assessment Methodology
A Checklist for Developing Defenses
Part IV: Designing Countermeasures for Tomorrow s Threats
Chapter 16: Exploiting Digital Forensics
Standard Forensic Methodology
Forensic Techniques: An Example Forensic Recovery and Investigation Procedure
Advanced Digital Forensic Tools
Ongoing Investigation: Implementing Forensic Tracers
A Checklist for Developing Defenses
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Types of Malicious Code and Security Risks
Common Malicious Code Behavior
A Checklist for Developing Defenses
Chapter 18: Exploiting Software
Application Attack Vectors
Threats and Vulnerabilities
Future Vulnerabilities and Techniques
A Checklist for Developing Defenses
List of Figures
List of Tables
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Creating Tables
Creating New Tables Using CREATE TABLE...AS
Client 2Adding Error Checking
Other Features
Overview
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 23. Find a Place to Live
Hack 40. The Ghost in Google Ride Finder
Hack 59. Show Lots of StuffQuickly
Hack 70. Will the Kids Barf? (and Other Cool Ways to Use Google Maps)
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
Partial Page Rendering
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
VBScript Basics
Processing Collections of Data
Handling Script Errors
Appendix A WSH Administrative Scripting
.NET-A Complete Development Cycle
Initial Project Planning
Implementation of the Photo Editor Application
Project Management Issues
Adding 3D Text to the Photo Editor Application
Online Store Requirements
VBScript in a Nutshell, 2nd Edition
Global Code
VBScript Data Types: The Many Faces of the Variant
Why Use WSH?
WSH Language Elements
Section A.5. Data Type Conversion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies