Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Декабрь 2024    »
ПнВтСрЧтПтСбВс
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Hack the Stack. Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork
 Категория: «Syngress», Безопасность, взлом
   
 
Hack the Stack. Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork
Автор: Michael Gregg
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-109-8
Количество страниц: 480
Язык: english
Формат: PDF

Remember the first time someone told you about the OSI model and described the various layers? It's probably something you never forgot. This book takes that same layered approach but applies it to network security in a new and refreshing way. It guides readers step-by-step through the stack starting with physical security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included because security is not just about technology it also requires interaction with people, policy and office politics. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
 
  • 0
Опубликовал: flashsoft | 7-12-2006, 00:00 | Просмотров: 1180  Подробнее и с комментариями (0)
  WarDriving and Wireless Penetration Testing
 Категория: «Syngress», Безопасность, взлом
   
 
WarDriving and Wireless Penetration Testing
Автор: Chris Hurley, Russ Rogers, Frank Thornton
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-111-X
Количество страниц: 449
Язык: english
Формат: PDF

WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and government use, security experts need to become familiar with the methodologies, tools, and tactics used by both penetration testers and attackers to compromise wireless networks and what they can do to both accomplish their jobs as penetration testers and how to protect networks from sophisticated attackers. WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
 
  • 0
Опубликовал: flashsoft | 7-12-2006, 00:00 | Просмотров: 1280  Подробнее и с комментариями (0)
  CD and DVD Forensics
 Категория: «Syngress», Безопасность, взлом
   
 
CD and DVD Forensics
Автор: Paul Crowley
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-128-4
Количество страниц: 321
Язык: english
Формат: PDF

CD and DVD Forensics takes the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time when data forensics is becoming a major part of law enforcement and prosecution in the public sector, as well as corporate and system security and integrity in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how-to book that gives the reader tools to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, readers in law enforcement and corporate security and private investigators will be more effective in performing their evidence-related tasks.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1244  Подробнее и с комментариями (1)
  Essential Computer Security
 Категория: Безопасность, взлом, «Syngress»
   
 
Essential Computer Security
Автор: Tony Bradley
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-114-4
Количество страниц: 321
Язык: english
Формат: PDF

This book is not intended to be comprehensive.There are hundreds of books on the shelf covering all areas of computer and network security.You can find many books that cover general information security in a much deeper and technical sense than this book will.There are also books that cover specific areas of security, such as encryption, firewalls, backup and recovery, and so on, in much more depth and detail than this book.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1088  Подробнее и с комментариями (0)
  Security Log Management - Identifying Patterns in the Chaos
 Категория: Безопасность, взлом, «Syngress»
   
 
Security Log Management - Identifying Patterns in the Chaos
Автор: Jacob Babbin, Dave Kleiman, Everett F. Carter Jr
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-042-3
Количество страниц: 352
Язык: русский
Формат: PDF

As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network's overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.
 
  • 0
Опубликовал: flashsoft | 15-11-2006, 00:00 | Просмотров: 1149  Подробнее и с комментариями (0)
  Combating Spyware in the Enterprise
 Категория: Безопасность, взлом, «Syngress»
   
 
Combating Spyware in the Enterprise
Автор: Paul Piccard, Jeremy Faircloth
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-064-4
Количество страниц: 406
Язык: english
Формат: PDF

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. System administrators and security professionals responsible for administering and securing networks ranging in size from SOHO networks up the largest, enterprise networks will learn to use a combination of free and commercial anti-spyware software, firewalls, intrusion detection systems, intrusion prevention systems, and host integrity monitoring applications to prevent the installation of spyware, and to limit the damage caused by spyware that does in fact infiltrate their network. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware
 
  • 0
Опубликовал: flashsoft | 13-11-2006, 00:00 | Просмотров: 1046  Подробнее и с комментариями (0)
  Disassembling Code. IDA Pro and SoftICE
 Категория: Безопасность, взлом, Тестирование, отладка ПО
   
 
Disassembling Code. IDA Pro and SoftICE
Автор: Vlad Pirogov
Издательство: A-List Publishing
Год издания: 2006
isbn: 1931769516
Количество страниц: 600
Язык: english
Формат: CHM

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize different elements of disassembled code in order to debug applications in less time. Also described are the basics of Assembly language programming (MASM) and the system and format of commands for the Intel microprocessor. Aspects of disassembling, analyzing, and debugging software code are considered in detail, and an overview of contemporary disassemblers and debuggers used when analyzing executable code is provided. The basics of working with these tools and their operating principles are also included, and emphasis is placed on analyzing software code and identifying the main structure of those languages in which they were written
 
  • 0
Опубликовал: flashsoft | 6-11-2006, 00:00 | Просмотров: 1645  Подробнее и с комментариями (0)
  How to Cheat at Securing a Wireless Network
 Категория: Безопасность, взлом, «Syngress»
   
 
How to Cheat at Securing a Wireless Network
Автор: Chris Hurley, Jan Kanclirz Jr.
Издательство: Syngress
Год издания: 2006
isbn: 1597490873
Количество страниц: 479
Язык: english
Формат: PDF

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors: Denial of service (DoS) and other network layer attacks; Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets; An increase in unmanaged or ill-managed endpoint devices; New applications like VoIP, instant messaging, and peer-to-peer. This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance
 
  • 0
Опубликовал: flashsoft | 1-11-2006, 00:00 | Просмотров: 1197  Подробнее и с комментариями (0)
  Hardening Windows Systems
 Категория: Компьютерная литература » Безопасность » Безопасность, взлом
   
 
Hardening Windows Systems
Автор: Roberta Bragg
Издательство: McGraw-Hill
Год издания: 2004
isbn: 0072253541
Количество страниц: 544
Язык: english
Формат: CHM

This straightforward, detailed guide offers step-by-step instructions to protecting your Windows systems against attacks, as well as provides ongoing actions to ensure long-term security.
 
  • 0
Опубликовал: flashsoft | 31-10-2006, 00:00 | Просмотров: 1112  Подробнее и с комментариями (0)
  Hackers Beware
 Категория: Компьютерная литература » Безопасность » Безопасность, взлом
   
 
Hackers Beware
Автор: Eric Cole
Издательство: New Riders Publishing
Год издания: 2002
isbn: 0-7357-1009-0
Количество страниц: 817
Язык: english
Формат: PDF

A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the knowledge to build a proper defense against attackers.
 
  • 0
Опубликовал: flashsoft | 8-10-2006, 00:00 | Просмотров: 1229  Подробнее и с комментариями (0)
  Главная страница | Регистрация | Новое на сайте | Статистика |
 
«Librus - Mountain of Knowledge»
«Либрус - гора знаний» 2004-2020
Design by Flashsoft © 2005-2020