The Complete Guide to Protecting Your Network
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerable expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws of Security
 Review the author's guidelines for discovering security problems when reviewing or designing a system.
- Learn the Seven Categories of Attack
 See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you!
- Prevent Diffing
 See how comparison of a program, library, or file before and after some action can affect your network data.
- Learn about Standard Cryptographic Algorithms
 See how secure your encrypted files and passwords really are.
- Understand Format String Vulnerabilities
 Learn about one of the newest additions to the hacker's bag of tricks.
- Learn about Session Hijacking Types
 Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks.
- Understand the Strategic Constraints of Tunnel Design
 Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH.
- Hack Proof Your Hardware
 Design products with tamper mechanisms: resistance, evidence, detection, and response.
- Download a Free Sniffer from the Book's Web Site
 Access the Hack Proofing Web site for complete source code and Carnivore Source Code.
- Register for your 1-year upgrade
 The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
 
            
Comments
There are currently no comments
New Comment