Security Warrior

Valutazione media 3,47
( su 58 valutazioni fornite da GoodReads )
 
9780596005450: Security Warrior

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Contenuti:

Dedication; Preface; Organization of This Book; Part I: Software Cracking; Part II: Network Stalking; Part III: Platform Attacks; Part IV: Advanced Defense; Part V: Appendix; Conventions Used in This Book; Using Code Examples; Comments and Questions; Acknowledgments; Part I: Software Cracking; Chapter 1: Assembly Language; 1.1 Registers; 1.2 ASM Opcodes; 1.3 References; Chapter 2: Windows Reverse Engineering; 2.1 History of RCE; 2.2 Reversing Tools; 2.3 Reverse Engineering Examples; 2.4 References; Chapter 3: Linux Reverse Engineering; 3.1 Basic Tools and Techniques; 3.2 A Good Disassembly; 3.3 Problem Areas; 3.4 Writing New Tools; 3.5 References; Chapter 4: Windows CE Reverse Engineering; 4.1 Windows CE Architecture; 4.2 CE Reverse Engineering Fundamentals; 4.3 Practical CE Reverse Engineering; 4.4 Reverse Engineering serial.exe; 4.5 References; Chapter 5: Overflow Attacks; 5.1 Buffer Overflows; 5.2 Understanding Buffers; 5.3 Smashing the Stack; 5.4 Heap Overflows; 5.5 Preventing Buffer Overflows; 5.6 A Live Challenge; 5.7 References; Part II: Network Stalking; Chapter 6: TCP/IP Analysis; 6.1 A Brief History of TCP/IP; 6.2 Encapsulation; 6.3 TCP; 6.4 IP; 6.5 UDP; 6.6 ICMP; 6.7 ARP; 6.8 RARP; 6.9 BOOTP; 6.10 DHCP; 6.11 TCP/IP Handshaking; 6.12 Covert Channels; 6.13 IPv6; 6.14 Ethereal; 6.15 Packet Analysis; 6.16 Fragmentation; 6.17 References; Chapter 7: Social Engineering; 7.1 Background; 7.2 Performing the Attacks; 7.3 Advanced Social Engineering; 7.4 References; Chapter 8: Reconnaissance; 8.1 Online Reconnaissance; 8.2 Conclusion; 8.3 References; Chapter 9: OS Fingerprinting; 9.1 Telnet Session Negotiation; 9.2 TCP Stack Fingerprinting; 9.3 Special-Purpose Tools; 9.4 Passive Fingerprinting; 9.5 Fuzzy Operating System Fingerprinting; 9.6 TCP/IP Timeout Detection; 9.7 References; Chapter 10: Hiding the Tracks; 10.1 From Whom Are You Hiding?; 10.2 Postattack Cleanup; 10.3 Forensic Tracks; 10.4 Maintaining Covert Access; 10.5 References; Part III: Platform Attacks; Chapter 11: Unix Defense; 11.1 Unix Passwords; 11.2 File Permissions; 11.3 System Logging; 11.4 Network Access in Unix; 11.5 Unix Hardening; 11.6 Unix Network Defense; 11.7 References; Chapter 12: Unix Attacks; 12.1 Local Attacks; 12.2 Remote Attacks; 12.3 Unix Denial-of-Service Attacks; 12.4 References; Chapter 13: Windows Client Attacks; 13.1 Denial-of-Service Attacks; 13.2 Remote Attacks; 13.3 Remote Desktop/Remote Assistance; 13.4 References; Chapter 14: Windows Server Attacks; 14.1 Release History; 14.2 Kerberos Authentication Attacks; 14.3 Kerberos Authentication Review; 14.4 Defeating Buffer Overflow Prevention; 14.5 Active Directory Weaknesses; 14.6 Hacking PKI; 14.7 Smart Card Hacking; 14.8 Encrypting File System Changes; 14.9 Third-Party Encryption; 14.10 References; Chapter 15: SOAP XML Web Services Security; 15.1 XML Encryption; 15.2 XML Signatures; 15.3 Reference; Chapter 16: SQL Injection; 16.1 Introduction to SQL; 16.2 SQL Injection Attacks; 16.3 SQL Injection Defenses; 16.4 PHP-Nuke Examples; 16.5 References; Chapter 17: Wireless Security; 17.1 Reducing Signal Drift; 17.2 Problems with WEP; 17.3 Cracking WEP; 17.4 Practical WEP Cracking; 17.5 VPNs; 17.6 TKIP; 17.7 SSL; 17.8 Airborne Viruses; 17.9 References; Part IV: Advanced Defense; Chapter 18: Audit Trail Analysis; 18.1 Log Analysis Basics; 18.2 Log Examples; 18.3 Logging States; 18.4 When to Look at the Logs; 18.5 Log Overflow and Aggregation; 18.6 Challenge of Log Analysis; 18.7 Security Information Management; 18.8 Global Log Aggregation; 18.9 References; Chapter 19: Intrusion Detection Systems; 19.1 IDS Examples; 19.2 Bayesian Analysis; 19.3 Hacking Through IDSs; 19.4 The Future of IDSs; 19.5 Snort IDS Case Study; 19.6 IDS Deployment Issues; 19.7 References; Chapter 20: Honeypots; 20.1 Motivation; 20.2 Building the Infrastructure; 20.3 Capturing Attacks; 20.4 References; Chapter 21: Incident Response; 21.1 Case Study: Worm Mayhem; 21.2 Definitions; 21.3 Incident Response Framework; 21.4 Small Networks; 21.5 Medium-Sized Networks; 21.6 Large Networks; 21.7 References; Chapter 22: Forensics and Antiforensics; 22.1 Hardware Review; 22.2 Information Detritus; 22.3 Forensics Tools; 22.4 Bootable Forensics CD-ROMs; 22.5 Evidence Eliminator; 22.6 Forensics Case Study: FTP Attack; 22.7 References; Part V: Appendix; Appendix A: Useful SoftICE Commands and Breakpoints; A.1 SoftICE Commands; A.2 Breakpoints; Colophon;

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

Edizione Internazionale
Edizione Internazionale

1.

Peikari, Cyrus; Chuvakin, Anton
Editore: O'Reilly Media
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Brossura Quantità: > 20
Edizione Internazionale
Da
Sunshine Book Store
(Wilmington, DE, U.S.A.)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media. Condizione libro: New. 0596005458 This is an International Edition. Brand New, Paperback, Delivery within 6-14 business days, Similar Contents as U.S Edition, ISBN and Cover design may differ, printed in Black & White. Choose Expedited shipping for delivery within 3-8 business days. We do not ship to PO Box, APO , FPO Address. In some instances, subjects such as Management, Accounting, Finance may have different end chapter case studies and exercises. International Edition Textbooks may bear a label "Not for sale in the U.S. or Canada" and "Content may different from U.S. Edition" - printed only to discourage U.S. students from obtaining an affordable copy. The U.S. Supreme Court has asserted your right to purchase international editions, and ruled on this issue. Access code/CD is not provided with these editions , unless specified. We may ship the books from multiple warehouses across the globe, including India depending upon the availability of inventory storage. Customer satisfaction guaranteed. Codice libro della libreria NU9780596005450

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 15,27
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

2.

Peikari, Cyrus; Chuvakin, Anton
Editore: O'Reilly Media
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi PAPERBACK Quantità: 1
Da
Your Online Bookstore
(Houston, TX, U.S.A.)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media. PAPERBACK. Condizione libro: New. 0596005458 Ships promptly from Texas. Codice libro della libreria GNI3281.2RMAN110416H1276

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 21,84
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Edizione Internazionale
Edizione Internazionale

3.

Cyrus Peikari
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Soft cover Quantità: > 20
Edizione Internazionale
Da
University Bookstore
(DELHI, DELHI, India)
Valutazione libreria
[?]

Descrizione libro 2004. Soft cover. Condizione libro: New. This book is BRAND NEW Soft cover International edition with black and white printing. ISBN number & cover page may be different but contents identical to the US edition word by word. Book is in English language. Codice libro della libreria UN-SHRO-603

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 13,80
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 10,00
Da: India a: U.S.A.
Destinazione, tempi e costi

4.

Peikari, Cyrus; Chuvakin, Anton
Editore: O'Reilly Media
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi PAPERBACK Quantità: > 20
Da
Mediaoutlet12345
(Springfield, VA, U.S.A.)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media. PAPERBACK. Condizione libro: New. 0596005458 *BRAND NEW* Ships Same Day or Next!. Codice libro della libreria SWATI2122349084

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 22,00
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,70
In U.S.A.
Destinazione, tempi e costi

5.

Peikari, Cyrus
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Paperback Quantità: > 20
Print on Demand
Da
BargainBookStores
(Grand Rapids, MI, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Paperback. Condizione libro: New. This item is printed on demand. Item doesn't include CD/DVD. Codice libro della libreria 975546

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 23,14
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,70
In U.S.A.
Destinazione, tempi e costi

6.

Cyrus Peikari; Anton Chuvakin
Editore: O'Reilly Media (2004)
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Paperback Quantità: 1
Da
Irish Booksellers
(Rumford, ME, U.S.A.)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media, 2004. Paperback. Condizione libro: New. book. Codice libro della libreria 0596005458

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 30,35
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

7.

Cyrus Peikari, Anton Chuvakin
Editore: O Reilly Media, Inc, USA, United States (2004)
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Paperback Quantità: 1
Da
The Book Depository
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro O Reilly Media, Inc, USA, United States, 2004. Paperback. Condizione libro: New. 231 x 178 mm. Language: English . Brand New Book. When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What s the worst an attacker can do to you? You d better find out, right? That s what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, spyware that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It s also the only book that shows you how SQL injection works. Codice libro della libreria AAH9780596005450

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 30,89
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

8.

Cyrus Peikari, Anton Chuvakin
Editore: O Reilly Media, Inc, USA, United States (2004)
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Paperback Quantità: 1
Da
The Book Depository US
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro O Reilly Media, Inc, USA, United States, 2004. Paperback. Condizione libro: New. 231 x 178 mm. Language: English . Brand New Book. When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What s the worst an attacker can do to you? You d better find out, right? That s what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, spyware that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It s also the only book that shows you how SQL injection works. Codice libro della libreria AAH9780596005450

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 30,96
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

9.

Peikari, Cyrus/ Chuvakin, Anton
Editore: O'Reilly Media 2004-01-19 (2004)
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Quantità: 5
Da
Chiron Media
(Wallingford, Regno Unito)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media 2004-01-19, 2004. Condizione libro: New. Codice libro della libreria NU-ING-00449318

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 29,87
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,46
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

10.

Cyrus Peikari
Editore: O'Reilly Media (2017)
ISBN 10: 0596005458 ISBN 13: 9780596005450
Nuovi Paperback Quantità: 20
Print on Demand
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro O'Reilly Media, 2017. Paperback. Condizione libro: New. This item is printed on demand. Codice libro della libreria 0596005458

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 30,77
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,77
In U.S.A.
Destinazione, tempi e costi

Vedi altre copie di questo libro

Vedi tutti i risultati per questo libro