Flylib.com
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Back Cover
Back Cover
About
Foreword
Introduction
Layout and Key Elements
About the Companion Web Site
Part I: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Basic Internet Services
Supplementary Internet Services
Security Questionnaire
A Checklist for Developing Defenses
Chapter 2: ISP Security Practices--Separating Fact from Fiction
Components of ISP Security
Exposing Weaknesses in ISP Security
Internet Routing--A Little Deeper
Routing Policy
ISP Acceptable Use Policy and Incident Response
A Checklist for Developing Defenses
Chapter 3: Securing the Domain Name System
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Part II: Defending Your Perimeter and Critical Internet Infrastructure
Chapter 4: Reliable Connectivity
Components of Reliable Connectivity
Exposing Weaknesses in Connectivity
Border Router Security
Internet Gateways and Multihoming
Backup of Critical Device Configurations
Bandwidth Utilization
Redundant and Spare Equipment
Geographic Distribution of Critical Systems
A Checklist for Developing Defenses
Chapter 5: Securing the Perimeter
The Network Firewall
Types of Firewall Technologies
Firewall Deployment
A Checklist for Developing Defenses
Chapter 6: Redefining the DMZ--Securing Critical Systems
Components of Defense-in-Depth
Exposing Weaknesses of DMZs
Stand-alone Systems in the DMZ
Reverse-Proxy Systems in the DMZ
A Checklist for Developing Defenses
Chapter 7: Intrusion Detection and Prevention
Network-Based Intrusion Detection
Host-Based Intrusion Prevention
Security Information Management
A Checklist for Developing Defenses
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Background and Function
Exposing Weaknesses: E-mail Abuse
MTAs
Relay Security and Blocking Lists
MTA E-mail Filtering
MTA Encryption
MTA Redundancy
RemoteClient E-mail Security
Public Notifications and Role Accounts
A Checklist for Developing Defenses
Chapter 9: Data Leaks--Exploiting Egress
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Chapter 10: Sinkholes and Backscatter
Background and Function
Using Sinkholes to Deploy Decoy Networks
Implementing Sinkholes to Defend Against DDoS Attacks (Blackhole Routing)
Backscatter and Tracebacks
A Checklist for Developing Defenses
Chapter 11: Securing Wireless Networks
Wireless History
Basic Wireless Security
Advanced Wireless Security
Bluetooth
The Wireless Jail
A Checklist for Developing Defenses
Part III: Network Vulnerability Assessments
Chapter 12: Vulnerability and Patch Management
Vulnerability Lifecycle
Discovery
Prioritization
Deployment
A Checklist for Developing Defenses
Chapter 13: A Winning Methodology for Vulnerability Assessments
Security vs. Functionality (A Business Justification)
Methodology
Assessment Logistics
A Checklist for Developing Defenses
Chapter 14: Performing the Assessment, Part I
Information Gathering
Mapping Your Theatre of War
A Checklist for Developing Defenses
Chapter 15: Performing the Assessment, Part II
Target Qualification
Attack Profiling
Attack
Defenses and Remediation Tools
Our Assessment Methodology
A Checklist for Developing Defenses
Part IV: Designing Countermeasures for Tomorrow s Threats
Chapter 16: Exploiting Digital Forensics
Standard Forensic Methodology
Forensic Techniques: An Example Forensic Recovery and Investigation Procedure
Advanced Digital Forensic Tools
Ongoing Investigation: Implementing Forensic Tracers
A Checklist for Developing Defenses
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Types of Malicious Code and Security Risks
Common Malicious Code Behavior
A Checklist for Developing Defenses
Chapter 18: Exploiting Software
Application Attack Vectors
Threats and Vulnerabilities
Future Vulnerabilities and Techniques
A Checklist for Developing Defenses
List of Figures
List of Tables
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Basic Graphics Commands
Programming the Keyboard, Mouse, and Joystick
Loading and Saving Information Using Files
Epilogue
MySQL Stored Procedure Programming
Some Words of Advice for Developers
SQL Statements in Stored Functions
Stored Programs and Code Injection
Optimizing Stored Program Code
Best Practices in MySQL Stored Program Development
Lotus Notes and Domino 6 Development (2nd Edition)
Whats New in Domino Designer?
Adding Framesets to Domino Applications
What Is JavaScript?
The Document Object Model
Real-World Java Examples
Software Configuration Management
Configuration Identification
Configuration Verification and Audit
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Appendix G Sample Inspection Plan
Data Structures and Algorithms in Java
Projects
Amortized Analysis
Problems
Vocabulary
D.3. Games
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Five Stimulating Interest
Chapter Ten Vision Re-engineering
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Fourteen Getting Started with the Process
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies