This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist.
This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist.
Victor is an accomplished author, speaker, and teacher in the field of network security and a specialized consultant to some of the worlds most admired companies. Victors open source software has been distributed to hundreds of thousands of computers worldwide and some is used in graduate-level college curricula to demonstrate advanced networking techniques. Early in his career as an engineer, Victor developed portions of the backbone systems infrastructure for Genuity, the first Internet data center company. Later, as a senior architect for BBN and GTE Internetworking, Victor developed security-related products and services centered on public key infrastructure (PKI). A great deal of Victor's professional career has been dedicated to tactical engineering and consulting for global telecom operators and critical infrastructure organizations in industries such as power and water, financial services, and defense. Some of the largest global companies frequently call upon Victor to perform advanced vulnerability assessments, provide expert counsel, and navigate complex regulatory issues concerning information security. An accomplished executive and engineer in network security, data hosting services, and software development, Victor also holds US intellectual property patents in distributed adaptive routing and wireless consumer applications.
Inhaltsangabe
Part 1: Core Internet Infrastructure for Security Professionals Chapter 1: Internet Infrastructure for Security Professionals Chapter 2: ISP Security Practices: Separating Fact From Fiction Chapter 3: Securing the Domain Name System Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter Chapter 4: Reliable Connectivity Chapter 5: Securing the Perimeter Chapter 6: DMZs In-Depth Chapter 7: Intrusion Detection and Prevention Chapter 8: Remote Application Access and Filtering Chapter 9: E-Mail Gateways, Filtering, and Redundancy Chapter 10: Data Leaks -- Exploiting Egress Chapter 11: Sinkhole and Backscatter Tools Chapter 12: Securing Wireless Networks Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals Chapter 13: Public Information that Pro's Miss (but attackers don't) Chapter 14: Coordination of Tools for Maximum Recon Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments Chapter 16: Deploy: ATTACK / DEFEND Part 4: You've been hacked: What comes next? Chapter 17: Identifying Recon and Attacks in Progress Chapter 18: Identifying, Containing, and Mitigating the Infiltration Chapter 19: Exploiting Digital Forensics Part 5: Designing New Threats and Countermeasures for Tomorrow Chapter 20: Viruses, Worms, Trojans, and Malware Chapter 21: Exploiting Software
Part 1: Core Internet Infrastructure for Security Professionals Chapter 1: Internet Infrastructure for Security Professionals Chapter 2: ISP Security Practices: Separating Fact From Fiction Chapter 3: Securing the Domain Name System Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter Chapter 4: Reliable Connectivity Chapter 5: Securing the Perimeter Chapter 6: DMZs In-Depth Chapter 7: Intrusion Detection and Prevention Chapter 8: Remote Application Access and Filtering Chapter 9: E-Mail Gateways, Filtering, and Redundancy Chapter 10: Data Leaks -- Exploiting Egress Chapter 11: Sinkhole and Backscatter Tools Chapter 12: Securing Wireless Networks Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals Chapter 13: Public Information that Pro's Miss (but attackers don't) Chapter 14: Coordination of Tools for Maximum Recon Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments Chapter 16: Deploy: ATTACK / DEFEND Part 4: You've been hacked: What comes next? Chapter 17: Identifying Recon and Attacks in Progress Chapter 18: Identifying, Containing, and Mitigating the Infiltration Chapter 19: Exploiting Digital Forensics Part 5: Designing New Threats and Countermeasures for Tomorrow Chapter 20: Viruses, Worms, Trojans, and Malware Chapter 21: Exploiting Software
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826