Flylib.com
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Back Cover
Back Cover
About
Foreword
Introduction
Layout and Key Elements
About the Companion Web Site
Part I: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Basic Internet Services
Supplementary Internet Services
Security Questionnaire
A Checklist for Developing Defenses
Chapter 2: ISP Security Practices--Separating Fact from Fiction
Components of ISP Security
Exposing Weaknesses in ISP Security
Internet Routing--A Little Deeper
Routing Policy
ISP Acceptable Use Policy and Incident Response
A Checklist for Developing Defenses
Chapter 3: Securing the Domain Name System
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Part II: Defending Your Perimeter and Critical Internet Infrastructure
Chapter 4: Reliable Connectivity
Components of Reliable Connectivity
Exposing Weaknesses in Connectivity
Border Router Security
Internet Gateways and Multihoming
Backup of Critical Device Configurations
Bandwidth Utilization
Redundant and Spare Equipment
Geographic Distribution of Critical Systems
A Checklist for Developing Defenses
Chapter 5: Securing the Perimeter
The Network Firewall
Types of Firewall Technologies
Firewall Deployment
A Checklist for Developing Defenses
Chapter 6: Redefining the DMZ--Securing Critical Systems
Components of Defense-in-Depth
Exposing Weaknesses of DMZs
Stand-alone Systems in the DMZ
Reverse-Proxy Systems in the DMZ
A Checklist for Developing Defenses
Chapter 7: Intrusion Detection and Prevention
Network-Based Intrusion Detection
Host-Based Intrusion Prevention
Security Information Management
A Checklist for Developing Defenses
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Background and Function
Exposing Weaknesses: E-mail Abuse
MTAs
Relay Security and Blocking Lists
MTA E-mail Filtering
MTA Encryption
MTA Redundancy
RemoteClient E-mail Security
Public Notifications and Role Accounts
A Checklist for Developing Defenses
Chapter 9: Data Leaks--Exploiting Egress
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Chapter 10: Sinkholes and Backscatter
Background and Function
Using Sinkholes to Deploy Decoy Networks
Implementing Sinkholes to Defend Against DDoS Attacks (Blackhole Routing)
Backscatter and Tracebacks
A Checklist for Developing Defenses
Chapter 11: Securing Wireless Networks
Wireless History
Basic Wireless Security
Advanced Wireless Security
Bluetooth
The Wireless Jail
A Checklist for Developing Defenses
Part III: Network Vulnerability Assessments
Chapter 12: Vulnerability and Patch Management
Vulnerability Lifecycle
Discovery
Prioritization
Deployment
A Checklist for Developing Defenses
Chapter 13: A Winning Methodology for Vulnerability Assessments
Security vs. Functionality (A Business Justification)
Methodology
Assessment Logistics
A Checklist for Developing Defenses
Chapter 14: Performing the Assessment, Part I
Information Gathering
Mapping Your Theatre of War
A Checklist for Developing Defenses
Chapter 15: Performing the Assessment, Part II
Target Qualification
Attack Profiling
Attack
Defenses and Remediation Tools
Our Assessment Methodology
A Checklist for Developing Defenses
Part IV: Designing Countermeasures for Tomorrow s Threats
Chapter 16: Exploiting Digital Forensics
Standard Forensic Methodology
Forensic Techniques: An Example Forensic Recovery and Investigation Procedure
Advanced Digital Forensic Tools
Ongoing Investigation: Implementing Forensic Tracers
A Checklist for Developing Defenses
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Types of Malicious Code and Security Risks
Common Malicious Code Behavior
A Checklist for Developing Defenses
Chapter 18: Exploiting Software
Application Attack Vectors
Threats and Vulnerabilities
Future Vulnerabilities and Techniques
A Checklist for Developing Defenses
List of Figures
List of Tables
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Adobe After Effects 7.0 Studio Techniques
The Timeline
Blending Modes: The Real Deal
Film, HDR, and 32 Bit Compositing
Working with Light
Explosions
Snort Cookbook
Logging Packets That Snort Captures
Logging Application Data
Installing and Configuring MySQL
Newbies Playing with Snort Using EagleX
Generating Statistical Output from Snort Databases
The Complete Cisco VPN Configuration Guide
Concentrator Features
Introduction to Accessing a Concentrator
L2L Connectivity Example
Configuring the VPN 3000 Concentrator
Easy VPN Server Support for 6.x
The Java Tutorial: A Short Course on the Basics, 4th Edition
Questions and Exercises
Summary of Exceptions
Practical Consideration of Writing Applets
Algorithms
Why Is Runtime.runFinalizersOnExit Deprecated?
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Multithreading
Web Services
Remoting and Enterprise Services
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies