Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …
Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion
Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …
Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …
Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…
Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …
Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…
Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…
Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…
Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…