Skip to content

Extreme Exploits Advanced Defenses Against Hardcore Hacks

Best in textbook rentals since 2012!

ISBN-10: 0072259558

ISBN-13: 9780072259551

Edition: 2006

Authors: Victor Oppleman, Oliver Friedrichs, Brett Watson

List price: $49.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

On a daily basis, the media reports on a hard-core hack against some organisation. This text provides solutions and methodologies which can guard against such attacks, describing the little-known vulnerabilities which have been exploited in large-scale networks.
Customers also bought

Book details

List price: $49.99
Copyright year: 2006
Publisher: McGraw-Hill Osborne
Binding: Paperback
Pages: 448
Size: 7.00" wide x 9.00" long x 1.00" tall
Weight: 1.628
Language: English

Brett works with hundreds of companies setting up their Social Media Networks and quickly realized that the Job Hunting market has completely moved. As a result he has written this informative Job Hunting guide that embraces the modern electronic world. the world that is now the reality of all Job Hunters.

Core Internet infrastructure for security professionals
Internet infrastructure for security professionalsp. 3
ISP security practices : separating fact from fictionp. 15
Securing the domain name systemp. 31
Defending your perimeter and critical Internet infrastructure
Reliable connectivityp. 53
Securing the perimeterp. 75
Redefining the DMZ : securing critical systemsp. 99
Intrusion detection and preventionp. 115
E-mail gateways, filtering, and redundancyp. 133
Data leaks : exploiting egressp. 165
Sinkholes and backscatterp. 175
Securing wireless networksp. 193
Network vulnerability assessments
Vulnerability and patch managementp. 213
A winning methodology for vulnerability assessmentsp. 229
Performing the assessment, part Ip. 257
Performing the assessment, part IIp. 287
Designing countermeasures for tomorrow's threats
Exploiting digital forensicsp. 323
Viruses, worms, trojans, and other malicious codep. 351
Exploiting softwarep. 371
Table of Contents provided by Blackwell. All Rights Reserved.