Security Warrior

ISBN-10: 0596005458
ISBN-13: 9780596005450
Edition: 2004
List price: $44.95 Buy it from $2.89
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd  More...

Used Starting from $21.57
New Starting from $33.32
eBooks Starting from $35.99
Rent
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $44.95
Copyright year: 2004
Publisher: O'Reilly Media, Incorporated
Publication date: 1/22/2004
Binding: Paperback
Pages: 556
Size: 6.75" wide x 9.00" long x 1.00" tall
Weight: 1.694
Language: English

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. "Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. "Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Dr. Anton Chuvakin is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of the books "Security Warrior" and "PCI Compliance" and has contributed to many others, while also publishing dozens of papers on log management, correlation, data analysis, PCI DSS, and security management. His blog (http://www.securitywarrior.org) is one of the most popular in the industry. Additionaly, Anton teaches classes and presents at many security conferences across the world and he works on emerging security standards and serves on the advisory boards of several security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Anton earned his Ph.D. from Stony Brook University.

Preface
Software Cracking
Assembly Language
Registers
ASM Opcodes
References
Windows Reverse Engineering
History of RCE
Reversing Tools
Reverse Engineering Examples
References
Linux Reverse Engineering
Basic Tools and Techniques
A Good Disassembly
Problem Areas
Writing New Tools
References
Windows CE Reverse Engineering
Windows CE Architecture
CE Reverse Engineering Fundamentals
Practical CE Reverse Engineering
Reverse Engineering serial.exe
References
Overflow Attacks
Buffer Overflows
Understanding Buffers
Smashing the Stack
Heap Overflows
Preventing Buffer Overflows
A Live Challenge
References
Network Stalking
TCP/IP Analysis
A Brief History of TCP/IP
Encapsulation
TCP
IP
UDP
ICMP
ARP
RARP
BOOTP
DHCP
TCP/IP Handshaking
Covert Channels
IPv6
Ethereal
Packet Analysis
Fragmentation
References
Social Engineering
Background
Performing the Attacks
Advanced Social Engineering
References
Reconnaissance
Online Reconnaissance
Conclusion
References
OS Fingerprinting
Telnet Session Negotiation
TCP Stack Fingerprinting
Special-Purpose Tools
Passive Fingerprinting
Fuzzy Operating System Fingerprinting
TCP/IP Timeout Detection
References
Hiding the Tracks
From Whom Are You Hiding?
Postattack Cleanup
Forensic Tracks
Maintaining Covert Access
References
Platform Attacks
Unix Defense
Unix Passwords
File Permissions
System Logging
Network Access in Unix
Unix Hardening
Unix Network Defense
References
Unix Attacks
Local Attacks
Remote Attacks
Unix Denial-of-Service Attacks
References
Windows Client Attacks
Denial-of-Service Attacks
Remote Attacks
Remote Desktop/Remote Assistance
References
Windows Server Attacks
Release History
Kerberos Authentication Attacks
Kerberos Authentication Review
Defeating Buffer Overflow Prevention
Active Directory Weaknesses
Hacking PKI
Smart Card Hacking
Encrypting File System Changes
Third-Party Encryption
References
SOAP XML Web Services Security
XML Encryption
XML Signatures
Reference
SQL Injection
Introduction to SQL
SQL Injection Attacks
SQL Injection Defenses
PHP-Nuke Examples
References
Wireless Security
Reducing Signal Drift
Problems with WEP
Cracking WEP
Practical WEP Cracking
VPNs
TKIP
SSL
Airborne Viruses
References
Advanced Defense
Audit Trail Analysis
Log Analysis Basics
Log Examples
Logging States
When to Look at the Logs
Log Overflow and Aggregation
Challenge of Log Analysis
Security Information Management
Global Log Aggregation
References
Intrusion Detection Systems
IDS Examples
Bayesian Analysis
Hacking Through IDSs
The Future of IDSs
Snort IDS Case Study
IDS Deployment Issues
References
Honeypots
Motivation
Building the Infrastructure
Capturing Attacks
References
Incident Response
Case Study: Worm Mayhem
Definitions
Incident Response Framework
Small Networks
Medium-Sized Networks
Large Networks
References
Forensics and Antiforensics
Hardware Review
Information Detritus
Forensics Tools
Bootable Forensics CD-ROMs
Evidence Eliminator
Forensics Case Study: FTP Attack
References
Appendix
Useful SoftICE Commands and Breakpoints
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×