Table of contents: ch. 1 Introduction 1.1.Trends 1.2.Data Mining and Security Technologies 1.3.Data Mining for Email Worm Detection 1.4.Data Mining for Malicious Code Detection 1.5.Data Mining for Detecting Remote Exploits 1.6.Data Mining for Botnet Detection 1.7.Stream Data Mining 1.8.Emerging Data Mining Tools for Cyber Security Applications 1.9.Organization of This Book 1.10.Nex…
Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…
Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …
Table of contents: pt. I Rethinking IT and Security ch. 1 Tectonic Shifts 1.1.Disruptive Forces 1.2.Deconstructing Cloud Computing 1.2.1.NIST Definition 1.2.2.The Three Service Models 1.2.3.The Four Deployment Models 1.3.The Rise of Mobility 1.4.New IT ch. 2 The Evolving Threat Landscape 2.1.From Cryptographers to World Leaders 2.2.The Changing Threat Landscape 2.3.Hacktivist…
Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion
Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpri…
Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …
Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …
CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…
Contents: ch. 1 Introduction to Critical Infrastructure Assurance and Protection 1.1.Introduction 1.2.What Is Critical Infrastructure? 1.3.What Is the Private Sector? 1.4.What Is the Public Sector? 1.5.What Is CIP? 1.6.What Is CIA? 1.7.What Are Public-Private Partnerships? 1.8.Critical Infrastructure Functions 1.9.Evolution of Critical Infrastructure ch. 2 Demand, Capacity, Fragili…