Extreme Exploits : Advanced Defenses Against Hardcore Hacks
暫譯: 極限利用:對抗高級黑客的進階防禦

Victor Oppleman, Oliver Friedrichs, Brett Watson

  • 出版商: McGraw-Hill Education
  • 出版日期: 2005-07-18
  • 定價: $1,700
  • 售價: 5.0$850
  • 語言: 英文
  • 頁數: 448
  • 裝訂: Paperback
  • ISBN: 0072259558
  • ISBN-13: 9780072259551
  • 相關分類: 資訊安全
  • 立即出貨 (庫存 < 4)

買這商品的人也買了...

商品描述

Description:

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You’ll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you’ll learn to prepare your network and software from threats that don’t yet exist. This is a must-have volume for anyone responsible for network security.

 

Table of Contents:

Part 1: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact From Fiction
Chapter 3: Securing the Domain Name System
Part 2: Defending Your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter Isn't Yesterday's Perimeter
Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: Remote Application Access and Filtering
Chapter 9: E-Mail Gateways, Filtering, and Redundancy
Chapter 10: Data Leaks -- Exploiting Egress
Chapter 11: Sinkhole and Backscatter Tools
Chapter 12: Securing Wireless Networks
Part 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals
Chapter 13: Public Information that Pro's Miss (but attackers don't)
Chapter 14: Coordination of Tools for Maximum Recon
Chapter 15: Building a Theatre of War -- the Winning Methodology for Vulnerability Assessments
Chapter 16: Deploy: ATTACK / DEFEND
Part 4: You've been hacked: What comes next?
Chapter 17: Identifying Recon and Attacks in Progress
Chapter 18: Identifying, Containing, and Mitigating the Infiltration
Chapter 19: Exploiting Digital Forensics
Part 5: Designing New Threats and Countermeasures for Tomorrow
Chapter 20: Viruses, Worms, Trojans, and Malware
Chapter 21: Exploiting Software

 

商品描述(中文翻譯)

**描述:**
保護您的網路和網站免受惡意攻擊,這本前沿指南將提供幫助。《Extreme Exploits》充滿了前所未有的先進安全技術和簡明的指導,解釋如何防禦軟體和網路基礎設施中的嚴重漏洞。本書將詳細分析現代威脅及其解決方案,並在每章結尾提供防禦開發的檢查清單。您還將接觸到一種成功的方法論,用於自訂漏洞評估,包括攻擊輪廓和戰爭劇場概念。通過對基礎技術的深入解釋,您將學會如何為尚不存在的威脅準備您的網路和軟體。這是任何負責網路安全的人必備的書籍。

**目錄:**
第一部分:安全專業人員的核心網際網路基礎設施
第1章:安全專業人員的網際網路基礎設施
第2章:ISP安全實踐:分辨事實與虛構
第3章:保護域名系統
第二部分:保護您的邊界和關鍵網際網路基礎設施:為什麼今天的邊界與昨天的邊界不同
第4章:可靠的連接性
第5章:保護邊界
第6章:深入了解DMZ
第7章:入侵檢測與防禦
第8章:遠端應用程式存取與過濾
第9章:電子郵件閘道、過濾與冗餘
第10章:數據洩漏——利用出口
第11章:Sinkhole和Backscatter工具
第12章:保護無線網路
第三部分:網路漏洞評估:超越腳本小子:安全專業人員的工具與技術
第13章:專業人士錯過的公共資訊(但攻擊者不會)
第14章:工具協調以達到最大偵查
第15章:建立戰爭劇場——漏洞評估的成功方法論
第16章:部署:攻擊/防禦
第四部分:您已被駭:接下來會發生什麼?
第17章:識別偵查和進行中的攻擊
第18章:識別、遏制和減輕滲透
第19章:利用數位取證
第五部分:為明天設計新威脅和對策
第20章:病毒、蠕蟲、木馬和惡意軟體
第21章:利用軟體