Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9949697901502882
    Format: 1 online resource (642 p.)
    ISBN: 1-281-00408-1 , 9786611004088 , 0-08-047559-0 , 1-59749-158-6
    Series Statement: Research in the history of economic thought and methodology
    Content: Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and security solutions for cutting edge technologies and emerging attack methodologies. The book begins with a chapter from ISS Founder Chris Klaus, who is one of the most prominent and well respected security experts in the world. Klaus discusses both
    Note: Includes index. , Cover; Contents; Foreword; Part I VoIP; Chapter 1 Threats to VoIP Communications Systems By Thomas Porter; Introduction; Denial-of-Service or VoIP Service Disruption; Call Hijacking and Interception; H.323-Specific Attacks; SIP-Specific Attacks; Chapter 2 Validate Existing Security Infrastructure for VoIP By Thomas Porter; Introduction; Security Policies and Processes; Physical Security; Server Hardening; Supporting Services; Unified Network Management; Chapter 3 Recommendations for VoIP Security By Thomas Porter; Introduction; Reuse Existing Security Infrastructure Wisely , Confirm User Identity; Active Security Monitoring; Logically Segregate VoIP from Data Traffic; Chapter 4 Skype Security By Paul Piccard; Introduction; Skype Architecture; Features and Security Information; Malicious Code; Client Security; Part II Malware; Chapter 5 The Transformation of Spyware By Tony Bradley; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Chapter 6 Spyware and the Enterprise Network By Jeremy Faircloth; Introduction; Keystroke Loggers; Trojan Encapsulation; Spyware and Backdoors; Chapter 7 Global IRC Security By Craig Edwards , Introduction; DDoS Botnets Turned Bot-Armies; Information Leakage; Copyright Infringement; Transfer of Malicious Files; Firewall/IDS Information; Chapter 8 Forensic Detection and Removal of Spyware By Brian Baskin; Introduction; Manual Detection Techniques; Detection and Removal Tools; Enterprise Removal Tools; Part III Phishing and Spam; Chapter 9 Go Phish! By Lance James; Introduction; The Impersonation Attack; The Forwarding Attack; The Popup Attack; Chapter 10 E-Mail: The Weapon of Mass Delivery By Lance James; Introduction; E-Mail Basics; Chapter 11 How Spam Works By Spammer X; Who Am I? , The Business of Spam; Spam in the Works: A Real-World Step-by-Step Example; Chapter 12 Sending Spam By Spammer X; The Required Mindset to Send Spam; Methods of Sending Spam; Chapter 13 Your E-mail: Digital Gold By Spammer X; What Does Your E-mail Address Mean to a Spammer?; Hackers and Spammers: Their United Partnership; Harvesting the Crumbs of the Internet; Mass Verification; Chapter 14 Creating the Spam Message and Getting It Read By Spammer X; Jake Calderon? Who Are You?; Part IV RFID; Chapter 15 RFID Attacks: Tag Encoding Attacks By Brad "Renderman" Haines; Introduction , Case Study: Johns Hopkins vs. SpeedPass; The SpeedPass; Chapter 16 RFID Attacks: Tag Application Attacks By Brad "Renderman" Haines; MIM; Chip Clones-Fraud and Theft; Tracking: Passports/Clothing; Chip Cloning 〉 Fraud; Disruption; Chapter 17 RFID Attacks: Securing Communications Using RFID Middleware By Anand M. Das; RFID Middleware Introduction; Attacking Middleware with the Air Interface; Understanding Security Fundamentals and Principles of Protection; Addressing Common Risks and Threats; Securing RFID Data Using Middleware; Using DES in RFID Middleware for Robust Encryption , Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams , English
    Additional Edition: ISBN 1-59749-056-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9786611004095?
Did you mean 9786611004118?
Did you mean 9786610004058?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages