Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (v. 3)

Valutazione media 3,89
( su 19 valutazioni fornite da Goodreads )
 
9780072263046: Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (v. 3)

The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

About the Author:

David Pollino has a strong background in security, wireless, and networking. David is currently a security practitioner working in financial services. During his career, he has worked for an industry-leading security consulting company, a large financial services company, and a tier 1 ISP. David often speaks at security events and has frequently been quoted in online and printed journals regarding security issues. During his career as a consultant and network engineer, David has worked for clients across multiple industries, including financial services, service providers, high technology, manufacturing, and government. He co-authored Wireless Security (RSA Press, 2002) and Hacker's Challenge and Hacker's Challenge 2 (McGraw-Hill/Osborne, 2001 and 2002, respectively).

Bill Pennington, CISSP, has six years of professional experience in information security and eleven years in information technology. His duties at WhiteHat include managing research and development, guiding product and technology direction, managing web application assessment teams, and developing and delivering WhiteHat Security training. Bill has performed web application assessments for more than four years in a variety of industry verticals including financial services, e-commerce, and biotechnology. He is familiar with Mac OS X, Linux, Solaris, Windows, and OpenBSD, and he is a Certified Information Security Systems Practitioner (CISSP) and Certified Cisco Network Administrator (CCNA). He has broad experience in web application security, penetration testing, computer forensics, and intrusion detection systems. Prior to joining WhiteHat, Bill was a principal consultant and technical lead for assessment services at Guardent, a nationwide security services provider.

Tony Bradley, CISSP-ISSAP, MCSE2k, has eight years of computer networking and administration experience, focusing the last four on network security and malware protection. Tony is a network security architect providing design, implementation, and management of network security solutions for a variety of Fortune 500 customers. He is also the editor and writer for the About.com Internet/Network Security website and frequently contributes to a variety of technical and security publications, both in print and on the Web. You can view his writing portfolio at http://www.s3kur3.com.

Himanshu Dwivedi is a founding partner of iSEC Partners, an independent provider of information security services and tools. He has 12 years of experience in security and IT. Before forming iSEC, he was Technical Director for @stake's Bay Area security practice. Himanshu's professional focus includes strategic security services, which leverages his experience with software development, infrastructure security, application security, tool development, and secure product design. He is considered an industry expert in storage security, specifically Fibre Channel/iSCSI SANs and CIFS/NFS NAS systems. Himanshu has presented at major security conferences throughout the world, including Black Hat, Storage Networking World, Syscan Singapore, and Bellua Indonesia. Himanshu also has a patent pending for a storage security design architecture that can be implemented on enterprise storage products for Fibre Channel networks. Himanshu has also authored two additional security books, including Securing Storage: A Practical Guide to SAN and NAS Security (Addison-Wesley, 2005) and Implementing SSH: Strategies for Optimizing the Secure Shell (Wiley, 2003).

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

1.

David Pollino, Bill Pennington, Tony Bradley
Editore: McGraw-Hill Education - Europe, United States (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback Quantità: 1
Da
The Book Depository
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education - Europe, United States, 2006. Paperback. Condizione libro: New. 3rd edition. Language: English . Brand New Book. The stories about phishing attacks against banks are so true-to-life, it s chilling. --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you ll get a detailed analysis of how the experts solved each incident. Codice libro della libreria AA39780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 34,33
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

2.

Pollino, David
Editore: McGraw-Hill/Osborne Media 5/16/2006 (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback or Softback Quantità: 10
Da
BargainBookStores
(Grand Rapids, MI, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill/Osborne Media 5/16/2006, 2006. Paperback or Softback. Condizione libro: New. Hacker's Challenge 3: 20 Brand-New Forensic Scenarios & Solutions. Book. Codice libro della libreria BBS-9780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 35,35
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

3.

David Pollino, Bill Pennington, Tony Bradley
Editore: McGraw-Hill Education - Europe, United States (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback Quantità: 1
Da
The Book Depository US
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education - Europe, United States, 2006. Paperback. Condizione libro: New. 3rd edition. Language: English . Brand New Book. The stories about phishing attacks against banks are so true-to-life, it s chilling. --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you ll get a detailed analysis of how the experts solved each incident. Codice libro della libreria AA39780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 35,40
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

4.

Pollino, David
Editore: McGraw-Hill Education (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Quantità: > 20
Print on Demand
Da
Pbshop
(Wood Dale, IL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2006. PAP. Condizione libro: New. New Book. Shipped from US within 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice libro della libreria IQ-9780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 32,08
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,34
In U.S.A.
Destinazione, tempi e costi

5.

Pollino, David
Editore: McGraw-Hill Education (2017)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback Quantità: > 20
Print on Demand
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2017. Paperback. Condizione libro: New. Never used! This item is printed on demand. Codice libro della libreria 0072263040

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 34,37
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 1,67
In U.S.A.
Destinazione, tempi e costi

6.

Pollino, David; Pennington, Bill; Bradley, Tony; Dwivedi, Himanshu
Editore: McGraw-Hill Education
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi PAPERBACK Quantità: 3
Da
Lakeside Books
(Benton Harbor, MI, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education. PAPERBACK. Condizione libro: New. 0072263040 BRAND NEW, GIFT QUALITY! NOT OVERSTOCKS OR MARKED UP REMAINDERS! DIRECT FROM THE PUBLISHER!|1.47. Codice libro della libreria OTF-Y-9780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 35,04
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,34
In U.S.A.
Destinazione, tempi e costi

7.

Himanshu Dwivedi
Editore: McGraw-Hill/Osborne Media
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback Quantità: > 20
Da
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill/Osborne Media. Paperback. Condizione libro: New. Paperback. 400 pages. Dimensions: 9.1in. x 7.4in. x 1.0in.The stories about phishing attacks against banks are so true-to-life, its chilling. --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them Find out in Hackers Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIXLinux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, youll get a detailed analysis of how the experts solved each incident. This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Paperback. Codice libro della libreria 9780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 36,54
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,31
In U.S.A.
Destinazione, tempi e costi

8.

David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Quantità: 5
Da
ReadWhiz
(Portland, OR, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Condizione libro: New. Codice libro della libreria ria9780072263046_ing

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 40,32
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

9.

Pollino, David
Editore: McGraw-Hill Education (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Quantità: > 20
Print on Demand
Da
Books2Anywhere
(Fairford, GLOS, Regno Unito)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2006. PAP. Condizione libro: New. New Book. Delivered from our UK warehouse in 3 to 5 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice libro della libreria IQ-9780072263046

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 30,32
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 10,23
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

10.

David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi
Editore: McGraw-Hill Education (2006)
ISBN 10: 0072263040 ISBN 13: 9780072263046
Nuovi Paperback Quantità: 1
Da
Irish Booksellers
(Rumford, ME, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2006. Paperback. Condizione libro: New. book. Codice libro della libreria M0072263040

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 46,71
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Vedi altre copie di questo libro

Vedi tutti i risultati per questo libro