NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.
»
Seven Deadliest Network Attacks
 
 

Seven Deadliest Network Attacks, 1st Edition

 
Seven Deadliest Network Attacks, 1st Edition,Stacy Prowell,Rob Kraus,Mike Borkin,ISBN9781597495493
 
 
 

  &      &      

Syngress

9781597495493

9781597495509

176

235 X 191

Know what you are up against; discover what the deadliest network attacks are and how to defend against them!

Print Book + eBook

USD 31.14
USD 51.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 26.95

eBook
eBook Overview

DRM Free included formats: EPub, Mobi, PDF

USD 24.95
Add to Cart
 
 

Key Features

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Description

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. Denial of Service
  2. War Dialing
  3. Penetration "Testing"
  4. Protocol Tunneling
  5. Spanning Tree Attacks
  6. Man-in-the-Middle
  7. Password Replay

Readership

Information security professionals of all levels; network admins; recreational hackers

Stacy Prowell

Stacy Prowell is a senior member of the CERT technical staff, and chief scientist of STAR*Lab. He is an expert in the function-theoretic foundations of software, and is currently conducting research and development for function extraction technology. Prowell has managed both commercial and academic software development projects and consulted on design, development, and testing of applications ranging from consumer electronics to medical scanners, from small embedded real-time systems to very large distributed applications. Prior to joining the SEI in 2005, Prowell was a research professor at the University of Tennessee. To support wider adoption of rigorous methods in industry, he started the Experimentation, Simulation, and Prototyping (ESP) project at the University of Tennessee, which develops software libraries and tools to support application of model-based testing and sequence-based specification. Software developed by this program is in use by over 30 organizations. Prior to working at the university, he served as a consultant in the software industry. His research interests include rigorous software specification methods, automated statistical testing, and function-theoretic analysis of program behavior. Prowell holds a PhD in Computer Science from the University of Tennessee and is a member of the ACM, IEEE, and Sigma Xi.

Affiliations and Expertise

Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab

Rob Kraus

Rob Kraus (CISSP, C|EH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management and client support while ensuring quality and timeliness of Solutionary's products and services. Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers. Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks. Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.

Affiliations and Expertise

CISSP, C|EH, MCSE; Senior Security Consultant for Solutionary, Inc.

Mike Borkin

Mike Borkin (MCSE, GSEC Gold) is an internationally recognized author and speaker in the area of IT security where he focuses mostly on data protection strategies, Microsoft security, and security architecture/engineering best practices. In addition to contributing articles related to security to magazines and speaking engagements for groups such as SANS and The Open Group in both the US and Europe, Mike is also the Co-Author of Vista Security for Dummies.

Affiliations and Expertise

MCSE, GSEC Gold

Seven Deadliest Network Attacks, 1st Edition

Introduction

Chapter 1: Denial of Service

Chapter 2: War Dialing

Chapter 3: Penetration "Testing"

Chapter 4: Protocol Tunneling

Chapter 5: Spanning Tree Attacks

Chapter 6: Man-in-the-Middle

Chapter 7: Password Replay

Quotes and reviews

Attacks may and will change, but the principles, assumptions and practices being used will likely remain the same for quite some time, and the authors did a good job explaining them. And that is the real value of this book--Zeljka Zorz, Help Net Security

"[Knapp] provides a quite readable introduction to industrial networks and how familiar security principles can be translated to apply in this complex area…. Whether you are charged with defending an industrial network or curious about all the "buzz" over SCADA security, Knapp's book will provide a solid introduction to this fascinating area. Definitely a recommended read."--IEEE Security.org

 
 
Discount on Science and Technology eBooks | Use code DRMFREE
NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.