Hacker’s Challenge 2 provides 20 brand-new real-life hacking challenges for network professionals to solve and includes in-depth solutions written by experienced security consultants and authors of the first edition.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Mike Schiffman, CISSP, has been involved in most every technical arena computer security has to offer. He has researched and developed many cutting edge technologies including tools such as firewalk and tracerx as well as the ubiquitously used low-level packet shaping library libnet. Mike has led audit teams through engagements for fortune 500 companies in the banking, automotive and manufacturing industries. He has spoken in front of several institutions and government agencies such as: NSA, CIA, DOD, AFWIC, SAIC, and army intelligence. Mike is the lead author of Hackers Challenge, and has written for numerous technical journals such as Software Magazine and has written articles for securityfocus.com, and authored many security white papers. Currently, Mike is the Director of Security Architecture for @stake, the leading provider of professional security services. Previous to @stake, Mike was the Director of Research and Development for Guardent, Inc.
Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hackers Challenge.
David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
"Awesome....Incredibly informative, insightful, as well as a lot of fun to read. Recommended for anyone who values the integrity and security of their network." --Shawn Bracken, Principal Research Engineer, Cenzic, Inc.
Do you have what it takes to keep hackers out of your network? This unique volume tests your computer forensics and response skills with 20 brand-new, real-life security incidents as told by top-tier security experts. In an entertaining and informative style, this book addresses key security topics, including Denial of Service, malicious code, Web application attacks, wireless technologies, insider and outsider attacks, and more. Each challenge unfolds like a chapter from a novel and includes details of the incident--how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. In Part II, you'll find a detailed explanation of exactly what was happening in each incident and the answers to the questioned posed in Part I, along with prevention and mitigation techniques.
Excerpt from "One Thing Leads to Another":
The Challenge: John is the I.T. Manager for a movie company working on the special effects for a hit film.... But the fan site has just posted an unauthorized clip of one of the most anticipated scenes in the movie.... A postproduction team member put the clip on the server but no one accessed it after that, at least not via FTP.... Then it happened again: more footage was released.... The Web master of the fan site supplied the e-mail address from which he received the files. John checked the ssh logs and the Web server logs.... He found an IP address he had not seen before.... He pinged the IP address then checked his arp table to get the machine's MAC address.... He began tracing the cable back to its source: the proxy server, which had not been used in 8 months....
The Solution: After reviewing the log files included in the challenge, propose your assessment: How could the employees have approached the initial investigation differently that may have helped them get to the culprit sooner? What does the lack of evidence in the ftp and ssh logs reveal? Was John's method of tracking down the proxy server the best method? What is the best solution to solve the vulnerability? Then, turn to the experts' answers to find out what really happened.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 10,39 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 38,71 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR004399310
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Codice articolo GOR005012377
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. (2nd)03 Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 4510890-6
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. (2nd)03 Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 10902624-20
Quantità: 2 disponibili
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Good. (2nd)03 Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 4510890-6
Quantità: 1 disponibili
Da: St Vincent de Paul of Lane County, Eugene, OR, U.S.A.
Condizione: Good. paperback This item shows wear from consistent use but remains in good readable condition. It may have marks on or in it, and may show other signs of previous use or shelf wear. May have minor creases or signs of wear on dust jacket. Packed with care, shipped promptly. Codice articolo X-007-3400
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00070064138
Quantità: 1 disponibili
Da: The Book Spot, Sioux Falls, MN, U.S.A.
Paperback. Condizione: New. Codice articolo Abebooks54604
Quantità: 1 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned0072226307
Quantità: 1 disponibili
Da: DeckleEdge LLC, Albuquerque, NM, U.S.A.
Condizione: New. Codice articolo Shelfdream0072226307
Quantità: 1 disponibili