Flylib.com
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Back Cover
Back Cover
About
Foreword
Introduction
Layout and Key Elements
About the Companion Web Site
Part I: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Basic Internet Services
Supplementary Internet Services
Security Questionnaire
A Checklist for Developing Defenses
Chapter 2: ISP Security Practices--Separating Fact from Fiction
Components of ISP Security
Exposing Weaknesses in ISP Security
Internet Routing--A Little Deeper
Routing Policy
ISP Acceptable Use Policy and Incident Response
A Checklist for Developing Defenses
Chapter 3: Securing the Domain Name System
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Part II: Defending Your Perimeter and Critical Internet Infrastructure
Chapter 4: Reliable Connectivity
Components of Reliable Connectivity
Exposing Weaknesses in Connectivity
Border Router Security
Internet Gateways and Multihoming
Backup of Critical Device Configurations
Bandwidth Utilization
Redundant and Spare Equipment
Geographic Distribution of Critical Systems
A Checklist for Developing Defenses
Chapter 5: Securing the Perimeter
The Network Firewall
Types of Firewall Technologies
Firewall Deployment
A Checklist for Developing Defenses
Chapter 6: Redefining the DMZ--Securing Critical Systems
Components of Defense-in-Depth
Exposing Weaknesses of DMZs
Stand-alone Systems in the DMZ
Reverse-Proxy Systems in the DMZ
A Checklist for Developing Defenses
Chapter 7: Intrusion Detection and Prevention
Network-Based Intrusion Detection
Host-Based Intrusion Prevention
Security Information Management
A Checklist for Developing Defenses
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Background and Function
Exposing Weaknesses: E-mail Abuse
MTAs
Relay Security and Blocking Lists
MTA E-mail Filtering
MTA Encryption
MTA Redundancy
RemoteClient E-mail Security
Public Notifications and Role Accounts
A Checklist for Developing Defenses
Chapter 9: Data Leaks--Exploiting Egress
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Chapter 10: Sinkholes and Backscatter
Background and Function
Using Sinkholes to Deploy Decoy Networks
Implementing Sinkholes to Defend Against DDoS Attacks (Blackhole Routing)
Backscatter and Tracebacks
A Checklist for Developing Defenses
Chapter 11: Securing Wireless Networks
Wireless History
Basic Wireless Security
Advanced Wireless Security
Bluetooth
The Wireless Jail
A Checklist for Developing Defenses
Part III: Network Vulnerability Assessments
Chapter 12: Vulnerability and Patch Management
Vulnerability Lifecycle
Discovery
Prioritization
Deployment
A Checklist for Developing Defenses
Chapter 13: A Winning Methodology for Vulnerability Assessments
Security vs. Functionality (A Business Justification)
Methodology
Assessment Logistics
A Checklist for Developing Defenses
Chapter 14: Performing the Assessment, Part I
Information Gathering
Mapping Your Theatre of War
A Checklist for Developing Defenses
Chapter 15: Performing the Assessment, Part II
Target Qualification
Attack Profiling
Attack
Defenses and Remediation Tools
Our Assessment Methodology
A Checklist for Developing Defenses
Part IV: Designing Countermeasures for Tomorrow s Threats
Chapter 16: Exploiting Digital Forensics
Standard Forensic Methodology
Forensic Techniques: An Example Forensic Recovery and Investigation Procedure
Advanced Digital Forensic Tools
Ongoing Investigation: Implementing Forensic Tracers
A Checklist for Developing Defenses
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Types of Malicious Code and Security Risks
Common Malicious Code Behavior
A Checklist for Developing Defenses
Chapter 18: Exploiting Software
Application Attack Vectors
Threats and Vulnerabilities
Future Vulnerabilities and Techniques
A Checklist for Developing Defenses
List of Figures
List of Tables
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Simple Hello, World Application Using Boost.Build
Including an Inline File
Introduction
Exceptions and Safety
Multiplying Matricies
The Complete Cisco VPN Configuration Guide
Bandwidth Management
Summary
Initial Access to the 3002
Summary
Summary
Data Structures and Algorithms in Java
Analyzing Recursive Algorithms
General Trees
Summary
Memory Management
A.9. Debugging
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 23. Explore David Rumseys Historical Maps
Hack 38. Add Location to Weblogs and RSS Feeds
Hack 61. Build a Map of Local GSM Cells
Hack 86. Track a Package Across the U.S.
Hack 95. Model Interactive Spaces
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Exaggeration Equals Characterization
Blue-Screen Garbage Mattes
Rotoscoping Techniques with Photoshop
Making Movies from Stills
InDesign Type: Professional Typography with Adobe InDesign CS2
Working with Tables
Up Next
Determining Margins
Break Characters
Things to Consider
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies