Client-Side Attacks and Defense
Autor Sean-Philip Oriyano, Robert Shimonskien Limba Engleză Paperback – 19 dec 2012
- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
- Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit—the client-side attack
- Defend your network against attacks that target your company's most vulnerable asset—the end user
Preț: 202.87 lei
Preț vechi: 273.69 lei
-26% Nou
Puncte Express: 304
Preț estimativ în valută:
35.90€ • 42.15$ • 31.51£
35.90€ • 42.15$ • 31.51£
Carte tipărită la comandă
Livrare economică 20 ianuarie-03 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495905
ISBN-10: 1597495905
Pagini: 296
Ilustrații: Approx. 70 illustrations
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: Elsevier
ISBN-10: 1597495905
Pagini: 296
Ilustrații: Approx. 70 illustrations
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: Elsevier
Public țintă
Penetration testers; security consultants; system and network administrators; IT auditorsCuprins
Introduction
Chapter 1: Background on Attacks
Chapter 2: A Closer Look at Client-Side Attacks
Chapter 3: A History of Web Browsers
Chapter 4: The Problem with Browsers
Chapter 5: Exploring and Exploiting Active Content
Chapter 6: Browser Defenses
Chapter 7: E-mail Client Attacks
Chapter 8: E-mail Client Defenses
Chapter 9: Web Applications
Chapter 10: Web Applications and Client Defenses
Chapter 11: Other Client-Side Attack Targets
Chapter 12: Malware
Chapter 13: Client-Side Countermeasures
Chapter 14: The Road Ahead
Chapter 1: Background on Attacks
Chapter 2: A Closer Look at Client-Side Attacks
Chapter 3: A History of Web Browsers
Chapter 4: The Problem with Browsers
Chapter 5: Exploring and Exploiting Active Content
Chapter 6: Browser Defenses
Chapter 7: E-mail Client Attacks
Chapter 8: E-mail Client Defenses
Chapter 9: Web Applications
Chapter 10: Web Applications and Client Defenses
Chapter 11: Other Client-Side Attack Targets
Chapter 12: Malware
Chapter 13: Client-Side Countermeasures
Chapter 14: The Road Ahead