Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Ноябрь 2024    »
ПнВтСрЧтПтСбВс
 123
45678910
11121314151617
18192021222324
252627282930 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Aggressive Network Self-defense
    Категория: Безопасность, взлом, «Syngress»
 
Aggressive Network Self-defense title=
Автор:
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)
Размер: 83 Мб
Каталожный номер: 712

Купить на OZON.ru
When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
 

Похожие публикации:

  • A Defense Manual of Commando Jiu-Jitsu
  • How to Use Jiu-Jitsu for Men and Women
  • The SAS Self-Defense Handbook: A Complete Guide to Unarmed Combat Technique ...
  • Professional Refactoring in C# & ASP.NET
  • Brazilian Jiu-Jitsu Self-Defense Techniques
  • DK Eyewitness - Cowboy
  • Active Networks
  • Upgrading and Repairing Networks
  • Combating Spyware in the Enterprise
  • Peer-to-Peer Computing : The Evolution of a Disruptive Technology



  •  
    Ссылки на файлообменные сервераРазмер архива в Mb
    http://rapidshare.de/files/9946601/Aggressive_Network_Self-Defense.part1.rar30.5
    http://rapidshare.de/files/9947103/Aggressive_Network_Self-Defense.part2.rar30.5
    http://rapidshare.de/files/9946414/Aggressive_Network_Self-Defense.part3.rar19.8

     
    Оцените эту публикацию!
     
    • 0
    Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1248   Комментарии (0)  Печать

     
      Информация  
     
    Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.

     
     

      Главная страница | Регистрация | Новое на сайте | Статистика |
     
    «Librus - Mountain of Knowledge»
    «Либрус - гора знаний» 2004-2020
    Design by Flashsoft © 2005-2020