The Complete Guide to Protecting Your Network
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerable expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws of Security
Review the author's guidelines for discovering security problems when reviewing or designing a system.
- Learn the Seven Categories of Attack
See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you!
- Prevent Diffing
See how comparison of a program, library, or file before and after some action can affect your network data.
- Learn about Standard Cryptographic Algorithms
See how secure your encrypted files and passwords really are.
- Understand Format String Vulnerabilities
Learn about one of the newest additions to the hacker's bag of tricks.
- Learn about Session Hijacking Types
Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks.
- Understand the Strategic Constraints of Tunnel Design
Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH.
- Hack Proof Your Hardware
Design products with tamper mechanisms: resistance, evidence, detection, and response.
- Download a Free Sniffer from the Book's Web Site
Access the Hack Proofing Web site for complete source code and Carnivore Source Code.
- Register for your 1-year upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Comments
There are currently no comments
New Comment