Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…
Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…
Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…
Part One: Overview Ch 1. Data communication, data networks and the internet Ch 2. Protocol architecture, TCP/IP, and internet-vbased applications Part Two: Data communications Ch 3. Data transmission Ch 4. Transmission media Ch 5. Signal encoding techniques Ch 6. Digital data communication techniques Ch 7. Dtat link control protocoils Ch 8. Multiplexing Ch 9. Spread spectrum Part …
Terdapat bibliografi dan indeks. Table of Contents Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERV…
Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)
Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…
Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…
Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…
Terdapat indeks. Table of contents: Chapter 1: Introducing Network Scanning Chapter 2: Introducing Nmap Chapter 3: Using Nmap Chapter 4: Fingerprinting with Nmap Chapter 5: Detection and Evasion with Nmap Chapter 6: Scanning in the Real World Chapter 7: Tooling Around with Nmap Chapter 7: Nmap scanning in the real world