E-Book, Englisch, 176 Seiten, Format (B × H): 191 mm x 235 mm
Prowell / Kraus / Borkin Seven Deadliest Network Attacks
1. Auflage 2010
ISBN: 978-1-59749-550-9
Verlag: Academic Press
Format: EPUB
Kopierschutz: 6 - ePub Watermark
E-Book, Englisch, 176 Seiten, Format (B × H): 191 mm x 235 mm
ISBN: 978-1-59749-550-9
Verlag: Academic Press
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack.
The book consists of seven chapters that deal with the following attacks: (i) denial of service; (ii) war dialing; (iii) penetration testing; (iv) protocol tunneling; (v) spanning tree attacks; (vi) man-in-the-middle; and (vii) password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data.
This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable
Zielgruppe
<p>Information security professionals of all levels; network admins; recreational hackers</p>
Autoren/Hrsg.
Weitere Infos & Material
Introduction Chapter 1. Denial of Service Chapter 2. War Dialing Chapter 3. Penetration "Testing" Chapter 4. Protocol Tunneling Chapter 5. Spanning Tree Attacks Chapter 6. Man-in-the-Middle Chapter 7. Password Replay