買這商品的人也買了...
-
$780$515 -
$640$506 -
$420$332 -
$400$380 -
$600$468 -
$2,120$2,014 -
$420$277 -
$580$458 -
$80$76 -
$580$493 -
$680$537 -
$180$171 -
$580$458 -
$880$581 -
$2,700$2,565 -
$490$382 -
$580$493 -
$780$616 -
$360$238 -
$880$695 -
$400$264 -
$399$263 -
$5,190$4,931 -
$680$612 -
$550$429
相關主題
商品描述
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.
商品描述(中文翻譯)
結合攻擊和防禦以實現更有效的網絡安全策略《網絡攻擊與利用》提供了一個清晰、全面的路線圖,用於開發完整的攻擊和防禦策略,以參與或阻止黑客和計算機間諜活動。本書由一位在政府和企業漏洞和安全運營方面具有專業知識的專家撰寫,幫助您了解這一領域的原則,超越當前的個別技術,開發持久的綜合解決方案。大量的實際案例說明了攻擊和防禦概念的運作,包括Conficker、Stuxnet、Target的受攻擊等。本書提供了關於策略、工具和實施的明確指導,並就如何阻止系統化的計算機間諜活動和從政府、公司和個人那裡竊取信息提供了實用建議。全球範圍內的計算機網絡攻擊和操縱層出不窮。其中一個最大的挑戰是將越來越多的信息納入一個整體計劃或框架中,以制定正確的策略來阻止這些攻擊。本書通過概述有效的方法、工具和應用所需的資源,消除了困惑。 * 理解計算機網絡利用的基本概念 * 學習系統化攻擊的性質和工具 * 檢視攻擊策略以及攻擊者如何保持優勢 * 理解防禦策略以及當前方法無法改變戰略平衡 政府、犯罪分子、公司和個人都在一個沒有界限的世界中運作,在這個世界中,幾個世紀以來建立的法律、習俗和規範才剛剛開始形成。與此同時,計算機間諜活動在頻率和影響力上不斷增長。本書將幫助您制定強大的攻擊或戰略性合理的防禦,以對抗攻擊和利用。對於更好的網絡安全路線圖,《網絡攻擊與利用》是您的完整實用指南。