Cyber Security Essentials
Editat de James Graham, Rick Howard, Ryan Olsonen Limba Engleză Hardback – 27 iul 2017
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 400.06 lei 6-8 săpt. | |
Auerbach Publications – 15 dec 2010 | 400.06 lei 6-8 săpt. | |
Hardback (1) | 1029.72 lei 3-5 săpt. | +26.86 lei 6-12 zile |
Taylor & Francis Ltd. – 27 iul 2017 | 1029.72 lei 3-5 săpt. | +26.86 lei 6-12 zile |
Preț: 1029.72 lei
Preț vechi: 1131.56 lei
-9%
Puncte Express: 1545
Preț estimativ în valută:
197.28€ • 213.69$ • 169.18£
197.28€ • 213.69$ • 169.18£
Carte disponibilă
Livrare economică 19 aprilie-03 mai
Livrare express 04-10 aprilie pentru 36.85 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138440401
ISBN-10: 113844040X
Pagini: 344
Dimensiuni: 241 x 161 x 27 mm
Greutate: 0.68 kg
Editura: Taylor & Francis Ltd.
ISBN-10: 113844040X
Pagini: 344
Dimensiuni: 241 x 161 x 27 mm
Greutate: 0.68 kg
Editura: Taylor & Francis Ltd.
Cuprins
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
iDefense Special File Investigation Tools
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
iDefense Special File Investigation Tools
Notă biografică
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense® Security Intelligence Services; a business unit of VeriSign, Inc.
iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country’s business sectors.
iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").
For more information, please contact customerservice@idefense.com.
iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country’s business sectors.
iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").
For more information, please contact customerservice@idefense.com.