Flylib.com
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Back Cover
Back Cover
About
Foreword
Introduction
Layout and Key Elements
About the Companion Web Site
Part I: Core Internet Infrastructure for Security Professionals
Chapter 1: Internet Infrastructure for Security Professionals
Basic Internet Services
Supplementary Internet Services
Security Questionnaire
A Checklist for Developing Defenses
Chapter 2: ISP Security Practices--Separating Fact from Fiction
Components of ISP Security
Exposing Weaknesses in ISP Security
Internet Routing--A Little Deeper
Routing Policy
ISP Acceptable Use Policy and Incident Response
A Checklist for Developing Defenses
Chapter 3: Securing the Domain Name System
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Part II: Defending Your Perimeter and Critical Internet Infrastructure
Chapter 4: Reliable Connectivity
Components of Reliable Connectivity
Exposing Weaknesses in Connectivity
Border Router Security
Internet Gateways and Multihoming
Backup of Critical Device Configurations
Bandwidth Utilization
Redundant and Spare Equipment
Geographic Distribution of Critical Systems
A Checklist for Developing Defenses
Chapter 5: Securing the Perimeter
The Network Firewall
Types of Firewall Technologies
Firewall Deployment
A Checklist for Developing Defenses
Chapter 6: Redefining the DMZ--Securing Critical Systems
Components of Defense-in-Depth
Exposing Weaknesses of DMZs
Stand-alone Systems in the DMZ
Reverse-Proxy Systems in the DMZ
A Checklist for Developing Defenses
Chapter 7: Intrusion Detection and Prevention
Network-Based Intrusion Detection
Host-Based Intrusion Prevention
Security Information Management
A Checklist for Developing Defenses
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Background and Function
Exposing Weaknesses: E-mail Abuse
MTAs
Relay Security and Blocking Lists
MTA E-mail Filtering
MTA Encryption
MTA Redundancy
RemoteClient E-mail Security
Public Notifications and Role Accounts
A Checklist for Developing Defenses
Chapter 9: Data Leaks--Exploiting Egress
Background and Function
Exposing Weaknesses
A Checklist for Developing Defenses
Chapter 10: Sinkholes and Backscatter
Background and Function
Using Sinkholes to Deploy Decoy Networks
Implementing Sinkholes to Defend Against DDoS Attacks (Blackhole Routing)
Backscatter and Tracebacks
A Checklist for Developing Defenses
Chapter 11: Securing Wireless Networks
Wireless History
Basic Wireless Security
Advanced Wireless Security
Bluetooth
The Wireless Jail
A Checklist for Developing Defenses
Part III: Network Vulnerability Assessments
Chapter 12: Vulnerability and Patch Management
Vulnerability Lifecycle
Discovery
Prioritization
Deployment
A Checklist for Developing Defenses
Chapter 13: A Winning Methodology for Vulnerability Assessments
Security vs. Functionality (A Business Justification)
Methodology
Assessment Logistics
A Checklist for Developing Defenses
Chapter 14: Performing the Assessment, Part I
Information Gathering
Mapping Your Theatre of War
A Checklist for Developing Defenses
Chapter 15: Performing the Assessment, Part II
Target Qualification
Attack Profiling
Attack
Defenses and Remediation Tools
Our Assessment Methodology
A Checklist for Developing Defenses
Part IV: Designing Countermeasures for Tomorrow s Threats
Chapter 16: Exploiting Digital Forensics
Standard Forensic Methodology
Forensic Techniques: An Example Forensic Recovery and Investigation Procedure
Advanced Digital Forensic Tools
Ongoing Investigation: Implementing Forensic Tracers
A Checklist for Developing Defenses
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Types of Malicious Code and Security Risks
Common Malicious Code Behavior
A Checklist for Developing Defenses
Chapter 18: Exploiting Software
Application Attack Vectors
Threats and Vulnerabilities
Future Vulnerabilities and Techniques
A Checklist for Developing Defenses
List of Figures
List of Tables
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
SQL Hacks
Hack 24. Multiply Across a Result Set
Hack 47. Exploit an SQL Injection Vulnerability
Hack 59. Define Personalized Parameters
Hack 78. Break It Down by Range
Hack 97. Allow an Anonymous Account
MySQL Cookbook
Connecting to the MySQL Server, Selecting a Database, and Disconnecting
Canonizing Not-Quite-ISO Date Strings
Recording a Rows Last Modification Time
Controlling Summary Display Order
Using MySQL-Based Sessions in Perl Applications
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is a Class?
Code Samples
Catching and Handling Exceptions
Runtime Exceptions The Controversy
Interfaces
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 11. How Far? How Fast? Geo-Enabling Your Spreadsheet
Hack 20. Make 3-D Raytraced Terrain Models
Hack 49. Get Your Tracklogs in Windows or Linux
Hack 51. Speak in Geotongues: GPSBabel to the Rescue
Hack 53. Visualize Your Tracks in Three Dimensions
Twisted Network Programming Essentials
Working with Asynchronous Results
Web Clients
Parsing HTTP Requests
Installing SOAP Libraries
Running Commands on a Remote Server
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies