UID:
almahu_9949697901502882
Umfang:
1 online resource (642 p.)
ISBN:
1-281-00408-1
,
9786611004088
,
0-08-047559-0
,
1-59749-158-6
Serie:
Research in the history of economic thought and methodology
Inhalt:
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and security solutions for cutting edge technologies and emerging attack methodologies. The book begins with a chapter from ISS Founder Chris Klaus, who is one of the most prominent and well respected security experts in the world. Klaus discusses both
Anmerkung:
Includes index.
,
Cover; Contents; Foreword; Part I VoIP; Chapter 1 Threats to VoIP Communications Systems By Thomas Porter; Introduction; Denial-of-Service or VoIP Service Disruption; Call Hijacking and Interception; H.323-Specific Attacks; SIP-Specific Attacks; Chapter 2 Validate Existing Security Infrastructure for VoIP By Thomas Porter; Introduction; Security Policies and Processes; Physical Security; Server Hardening; Supporting Services; Unified Network Management; Chapter 3 Recommendations for VoIP Security By Thomas Porter; Introduction; Reuse Existing Security Infrastructure Wisely
,
Confirm User Identity; Active Security Monitoring; Logically Segregate VoIP from Data Traffic; Chapter 4 Skype Security By Paul Piccard; Introduction; Skype Architecture; Features and Security Information; Malicious Code; Client Security; Part II Malware; Chapter 5 The Transformation of Spyware By Tony Bradley; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Chapter 6 Spyware and the Enterprise Network By Jeremy Faircloth; Introduction; Keystroke Loggers; Trojan Encapsulation; Spyware and Backdoors; Chapter 7 Global IRC Security By Craig Edwards
,
Introduction; DDoS Botnets Turned Bot-Armies; Information Leakage; Copyright Infringement; Transfer of Malicious Files; Firewall/IDS Information; Chapter 8 Forensic Detection and Removal of Spyware By Brian Baskin; Introduction; Manual Detection Techniques; Detection and Removal Tools; Enterprise Removal Tools; Part III Phishing and Spam; Chapter 9 Go Phish! By Lance James; Introduction; The Impersonation Attack; The Forwarding Attack; The Popup Attack; Chapter 10 E-Mail: The Weapon of Mass Delivery By Lance James; Introduction; E-Mail Basics; Chapter 11 How Spam Works By Spammer X; Who Am I?
,
The Business of Spam; Spam in the Works: A Real-World Step-by-Step Example; Chapter 12 Sending Spam By Spammer X; The Required Mindset to Send Spam; Methods of Sending Spam; Chapter 13 Your E-mail: Digital Gold By Spammer X; What Does Your E-mail Address Mean to a Spammer?; Hackers and Spammers: Their United Partnership; Harvesting the Crumbs of the Internet; Mass Verification; Chapter 14 Creating the Spam Message and Getting It Read By Spammer X; Jake Calderon? Who Are You?; Part IV RFID; Chapter 15 RFID Attacks: Tag Encoding Attacks By Brad "Renderman" Haines; Introduction
,
Case Study: Johns Hopkins vs. SpeedPass; The SpeedPass; Chapter 16 RFID Attacks: Tag Application Attacks By Brad "Renderman" Haines; MIM; Chip Clones-Fraud and Theft; Tracking: Passports/Clothing; Chip Cloning 〉 Fraud; Disruption; Chapter 17 RFID Attacks: Securing Communications Using RFID Middleware By Anand M. Das; RFID Middleware Introduction; Attacking Middleware with the Air Interface; Understanding Security Fundamentals and Principles of Protection; Addressing Common Risks and Threats; Securing RFID Data Using Middleware; Using DES in RFID Middleware for Robust Encryption
,
Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams
,
English
Weitere Ausg.:
ISBN 1-59749-056-3
Sprache:
Englisch