• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Infosecurity 2008 Threat Analysis » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Infosecurity 2008 Threat Analysis

ISBN-13: 9781597492249 / Angielski / Miękka / 2007 / 442 str.

Craig Schiller; Seth Fogie; Colby Derodeff
Infosecurity 2008 Threat Analysis Schiller, Craig 9781597492249 Syngress Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Infosecurity 2008 Threat Analysis

ISBN-13: 9781597492249 / Angielski / Miękka / 2007 / 442 str.

Craig Schiller; Seth Fogie; Colby Derodeff
cena 204,03
(netto: 194,31 VAT:  5%)

Najniższa cena z 30 dni: 198,30
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.

Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.

* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Computers > Computer Science
Wydawca:
Syngress Publishing
Język:
Angielski
ISBN-13:
9781597492249
Rok wydania:
2007
Ilość stron:
442
Waga:
0.79 kg
Wymiary:
23.52 x 19.25 x 3.0
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Foreword

Part I: Botnets

Chapter 1 Botnets: A Call to Action

Introduction

The Killer Web App

How Big is the Problem?

The Industry Responds

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 2 Botnets Overview

What is a Botnet?

The Botnet Life Cycle

What Does a Botnet Do?

Botnet Economic

Summary

Solutions Fast Track

Frequently Asked Questions

Part II Cross Site Scripting Attacks

Chapter 3 Cross-site Scripting Fundamentals

Introduction

Web Application Security

XML and AJAX Introduction

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4 XSS Theory

Introduction

Getting XSS'ed

DOM-based XSS in Detail

Redirection

CSRF

Flash, QuickTime, PDF, Oh My

HTTP Response Injection

Source vs. DHTML Reality

Bypassing XSS Length Limitations

XSS Filter Evasion

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 5 XSS Attack Methods

Introduction

History Stealing

Intranet Hacking

XSS Defacements

Summary

Solutions Fast Track

Frequently Asked Questions

References

Part III Physical and Logical Security Convergence

Chapter 6 Protecting Critical

Infrastructure: Process Control and SCADA

Introduction

Technology Background: Process Control Systems

Why Convergence?

Threats and Challenges

Conclusion

Chapter 7 Final Thought

Introduction

Final Thoughts from William Crower

Final Thoughts from Dan Dunkel

Final Thoughts from Brian Contos

Final Thoughts from Colby DeRodeoff

Part IV PCI Compliance

Chapter 8 Why PCi is Important

Introduction

What is PCI?

Overview of PCI Requirements

Risks and Consequences

Benefits of Compliance

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 9 Protect Cardholder Data

Protecting Cardholder Data

PCI Requirement 3: Protect Stored Cardholder Data

PCI Requirement 4~Encrypt Transmission of Cardholder Data Across Open, Public Networks

Using Compensating Controls

Mapping Out a Strategy

The Absolute Essentials

Summary

Solutions Fast Track

Frequently Asked Questions

Part V Asterisk and VolP Hacking

Chapter 10 Understanding and Taking Advantage of VolP Protocols

Introduction

Your Voice to Data

Making Your Voice Smaller

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 11 Asterisk Hardware Ninjutsu

Introduction

Serial

Motion

Modems

Fun with Dialing

Legalities and Tips

Summary

Solutions Fast Track

Frequently Asked Questions

Part VI Hack the Stack

Chapter 12 Social Engineering

Introduction

Attacking the People Layer

Defending the People Layer

Making the Case for Stronger Security

People Layer Security Project

Summary

Solutions Fast Track

Frequently Asked Questions

Index


Craig A Schiller (CISSP-ISSMP, ISSAP) is the CISO for Portland State University and President of Hawkeye Security Training, LLC. He is the primary author of the first Generally Accepted System Security Principles. He is a co-author of "Combating Spyware in the Enterprise” and "Winternals” from Syngress, several editions of the Handbook of Information Security Management, and a contributing author to Data Security Management. Mr. Schiller has co-founded two ISSA chapters, the Central Plains chapter and the Texas Gulf Coast Chapter. Seth Fogie is the VP of Dallas-based Airscanner Corporation where he oversees the development of security software for the Window Mobile (Pocket PC) platform. He has co-authored numerous technical books on information security, including the top selling "Maximum Wireless Security" from SAMS, and "Security Warrior" from O'Reilly. Seth frequently speaks at IT and security conferences/seminars, including Black Hat, Defcon, CSI, and Dallascon. In addition, Seth has co-authored the HIPAA medical education course for the Texas Medical Associate and is acting Site Host for Security at the "InformIT.com" website where he writes articles and reviews/manages weekly information security related books and articles Colby DeRodeff, GCIA, GCNA; Manager, Technical Marketing, ArcSight, has spent nearly a decade working with global organizations guiding best practices and empowering the use of ArcSight products across all business verticals including government, finance and healthcare. In this capacity he has been exposed to countless security and organizational challenges giving him a unique perspective on today's information security challenges.

Recognized as an expert in the field of IT security, Colby's primary areas of focus are insider threat, the convergence of physical and logical security, as well as enterprise security and information management. As the leader of ArcSight's Technical Marketing team, Colby drives content for customers to more easily identify and solve complex real-world issues. He has helped ArcSight grow from the earliest days as a sales consultant and implementation engineer, to joining the development organization where he was one of the founders of ArcSight's Strategic Application Solutions team delivering content solutions to solve real world problems such as compliance and insider threat.

Colby has held several consulting positions at companies; such as Veritas where he was responsible for deploying their global IDS infrastructure and ThinkLink Inc, where he maintained an enterprise VoIP network.

Colby attended San Francisco State University and holds both the SANS Intrusion Analyst (GCIA) and Network Auditor (GCNA) certifications

Michael Gregg is the President of Superior Solutions, Inc. and has more than 20 years' experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree and is certified as CISSP, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and TICSA. Michael's primary duty is to serve as project lead for security assessments, helping businesses and state agencies secure their IT resources and assets. Michael has authored four books, including Inside Network Security Assessment, CISSP Prep Questions, CISSP Exam Cram2, and Certified Ethical Hacker Exam Prep2. He has developed four high-level security classes, including Global Knowledge's Advanced Security Boot Camp, Intense School's Professional Hacking Lab Guide, ASPE's Network Security Essentials, and Assessing Network Vulnerabilities. He has written over 50 articles featured in magazines and Web sites, including Certification Magazine, GoCertify, The El Paso Times, and SearchSecurity. Michael is also a faculty member of Villanova University and creator of Villanova's college-level security classes, including Essentials of IS Security, Mastering IS Security, and Advanced Security Management. He also serves as a site expert for four TechTarget sites, including SearchNetworking, SearchSecurity, SearchMobileNetworking, and SearchSmallBiz. He is a member of the TechTarget Editorial Board.

Fogie, Seth Fogie is currently Senior Security Consultant at V... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia