AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
Current security management & Ethical issues of information technology
Protecting intellectual property in IT layoffs: legal and security issues
Technologies & methodologies for evaluating information technology in business
Teaching computer security at a small college
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Methods for the prevention, detection and removal of software security vulnerabilities
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
The session token protocol for forensics and traceback
ACM Transactions on Information and System Security (TISSEC)
Context-sensitive program analysis as database queries
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Retrofitting networked applications to add autonomic reconfiguration
DEAS '05 Proceedings of the 2005 workshop on Design and evolution of autonomic application software
Distributed computing and computer security education
Proceedings of the 6th conference on Information technology education
Writing requirements in computer security
Proceedings of the 6th conference on Information technology education
Ethical hacking and password cracking: a pattern for individualized security exercises
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
On-line update of situation assessment: A generic approach
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers from the KES2004 conference
Dangerous mobile behavior our students and university employees need to know about
Journal of Computing Sciences in Colleges
Wireless Handheld Devices Become Trusted Network Devices
Information Systems Security
The communication unit of measuring device in power engineering
WSEAS TRANSACTIONS on COMMUNICATIONS
HackSim: an automation of penetration testing for remote buffer overflow vulnerabilities
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
SP 800-44 Version 2. Guidelines on Securing Public Web Servers
SP 800-44 Version 2. Guidelines on Securing Public Web Servers
Hi-index | 0.00 |
From the Publisher:This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business,and how they can be stopped. In today's round-the-clock,hyper-connected,all-digital economy,computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions,Second Edition brings even more in-depth insight into how hackers infiltrate e-business,and how they can be stopped. Security insiders Stuart McClure,Joel Scambray,and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of Internet security moves even faster than the digital economy,and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world countermeasures in this one-of-a-kind volume to plug the holes in your network todaybefore they end up in the headlines tomorrow. New and Updated Material: Brand new "Hacking the Internet User" chapter covers insidious Internet client attacks against web browsers,email software,and active content,including the vicious new Outlook email date field buffer overflow and ILOVEYOU worms. A huge new chapter on Windows 2000 attacks and countermeasures covers offline password database attacks and Encrypting File System (EFS) vulnerabilities. Coverage of all the new Distributed Denial of Service (DDoS) tools and techniques that almost broke down the Internet in February 2000 (Trinoo,TFN2K,Stacheldraht). Significantly updated e-commerce hacking methodologies including new IIS and Cold Fusion vulnerabilities. A revised and updated dial-up chapter with new material onPBX and voicemail system hacking. New network discovery tools and techniques,including an updated section on Windows-based scanners,how to carry out eavesdropping attacks on switched networks using ARP redirection,and RIP spoofing attacks. Coverage of new back doors and forensic techniques,including defenses against Win9x back doors like Sub7. Updated coverage of security attacks against Windows 9x,Windows Me,Windows 2000,Windows NT,UNIX,Linux,NetWare,and dozens of other platforms,with appropriate countermeasures.