Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949697639102882
    Format: 1 online resource (481 p.)
    Edition: 1st edition
    ISBN: 1-281-27977-3 , 9786611279776 , 0-08-050774-3 , 1-59749-145-4
    Content: This book looks at network security in a new and refreshing way. It guides readers step-by-step through the ""stack"" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers th
    Note: Includes index. , Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Physical Layer; Introduction; Defending the Physical Layer; Attacking the Physical Layer; Layer 1 Security Project; Summary; Solutions Fast Track; Frequently Asked Questions , Chapter 3. Layer 2: The Data Link LayerIntroduction; Ethernet and the Data Link Layer; Understanding PPP and SLIP; Working with a Protocol Analyzer; Understanding How ARP Works; Attacking the Data Link Layer; Defending the Data Link Layer; SecuringYour Network from Sniffers; Employing Detection Techniques; Data Link Layer Security Project; Using the Auditor Security Collection to Crack WEP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Layer 3: The Network Layer; Introduction; The IP Packet Structure; The ICMP Packet Structure; Attacking the Network Layer , Defending the Network LayerNetwork Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Layer 5: The Session Layer; Introduction; Attacking the Session Layer , Defending the Session LayerSession Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Layer 6: The Presentation Layer; Introduction; The Structure of NetBIOS and SMB; Attacking the Presentation Layer; Defending the Presentation Layer; Presentation Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 8. Layer 7: The Application Layer; Introduction; The Structure of FTP; Analyzing Domain Name System and Its Weaknesses; Other Insecure Application Layer Protocols; Attacking the Application Layer , Defending the Application LayerNessus; Application-Layer Security Project: Using Nessus to Secure the Stack; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index , English
    Additional Edition: ISBN 1-59749-109-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages