Forum INFOMATH
Vous souhaitez réagir à ce message ? Créez un compte en quelques clics ou connectez-vous pour continuer.
-24%
Le deal à ne pas rater :
PC Portable Gaming 15.6″ Medion Erazer Deputy P40 (FHD 144Hz, RTX ...
759.99 € 999.99 €
Voir le deal

Seven Deadliest Network Attacks

Aller en bas

Seven Deadliest Network Attacks Empty Seven Deadliest Network Attacks

Message par methodiX Dim 9 Mai - 0:39

Seven Deadliest Network Attacks


[Vous devez être inscrit et connecté pour voir cette image]




Seven Deadliest Network Attacks
By Stacy Prowell, Rob Kraus, Mike Borkin
Publisher:
Syngress 2010 | 176 Pages | ISBN: 1597495492 | PDF | 6 MB


Do you need to keep up with the latest
hacks, attacks, and exploits effecting networks? Then you need Seven
Deadliest Network Attacks. This book pinpoints the most dangerous hacks
and exploits specific to networks, laying out the anatomy of these
attacks including how to make your system more secure. You will discover
the best ways to defend against these vicious hacks with step-by-step
instruction and learn techniques to make your computer and network
impenetrable.




Attacks
detailed in this book include:

Denial of Service
War
Dialing
Penetration "Testing"
Protocol Tunneling
Spanning Tree
Attacks
Man-in-the-Middle
Password Replay

Knowledge is
power, find out about the most dominant attacks currently waging war on
computers and networks globally

Discover the best ways to defend
against these vicious attacks; step-by-step instruction shows you how

Institute
countermeasures, don't be caught defenseless again, learn techniques to
make your computer and network impenetrable

About the Author
Stacy
Prowell is a senior member of the CERT technical staff, and chief
scientist of STAR*Lab. He is an expert in the function-theoretic
foundations of software, and is currently conducting research and
development for function extraction technology. Prowell has managed both
commercial and academic software development projects and consulted on
design, development, and testing of applications ranging from consumer
electronics to medical scanners, from small embedded real-time systems
to very large distributed applications. Prior to joining the SEI in
2005, Prowell was a research professor at the University of Tennessee.
To support wider adoption of rigorous methods in industry, he started
the Experimentation, Simulation, and Prototyping (ESP) project at the
University of Tennessee, which develops software libraries and tools to
support application of model-based testing and sequence-based
specification. Software developed by this program is in use by over 30
organizations. Prior to working at the university, he served as a
consultant in the software industry. His research interests include
rigorous software specification methods, automated statistical testing,
and function-theoretic analysis of program behavior. Prowell holds a PhD
in Computer Science from the University of Tennessee and is a member of
the ACM, IEEE, and Sigma Xi.
Rob Kraus (CISSP, C|EH, MCSE) is a
Senior Security Consultant for Solutionary, Inc. Rob is responsible for
organizing customer requirements, on-site project management and client
support while ensuring quality and timeliness of Solutionary's products
and services. Rob was previously a Remote Security Services Supervisor
with Digital Defense, Inc. He performed offensive-based security
assessments consisting of penetration testing, vulnerability assessment,
social engineering, wireless and VoIP penetration testing, web
application penetration tests and vulnerability research. As a
supervisor, Rob was also responsible for leading and managing a team of
penetration testers who performed assessment services for Digital
Defense's customers. Rob's background also includes contracting as a
security analyst for AT&T during the early stages of the AT&T
U-verse service as well as provisioning, optimizing, and testing OC-192
fiber-optic networks while employed with Nortel Networks. Rob also
speaks at information security conferences and universities in an effort
to keep the information security community informed of current security
trends and attack methodologies.
Mike Borkin (MCSE, GSEC Gold) is an
internationally recognized author and speaker in the area of IT
security where he focuses mostly on data protection strategies,
Microsoft security, and security architecture/engineering best
practices. In addition to contributing articles related to security to
magazines and speaking engagements for groups such as SANS and The Open
Group in both the US and Europe, Mike is also the Co-Author of Vista
Security for Dummies.


[Vous devez être inscrit et connecté pour voir ce lien]
methodiX
methodiX
Admin
Admin

Masculin
Nombre de messages : 1260
Localisation : Le couloir de l'école polytechnique de Tunis
Réputation : 68
Points : 7014
Date d'inscription : 22/03/2007

Feuille de personnage
Capacité linguistique:
Seven Deadliest Network Attacks Left_bar_bleue1000/1000Seven Deadliest Network Attacks Empty_bar_bleue  (1000/1000)

Revenir en haut Aller en bas

Revenir en haut


 
Permission de ce forum:
Vous ne pouvez pas répondre aux sujets dans ce forum