Gupta A., Laliberte S. - Defend I.T. Security by Example

Скачать

Defend I.T. Security by Example

Год: 2004

Автор: Ajay Gupta, Scott Laliberte

Жанр: Практическое пособие

Издательство: Addison Wesley, Pearson Education

ISBN: 0-321-19767-4

Язык: Английский

Формат: CHM

Качество: Изначально компьютерное (eBook)

Количество страниц: 384

Описание: What does a cyber security professional do? This is a question often posed by individuals who have heard a lot about security—especially the need to secure their electronic assets—but who are not entirely clear on what is involved. Cyber security involves a variety of things. Although we, the cyber security professionals, understand the various aspects of our jobs, it is often difficult to explain to people outside the profession (even our spouses) what exactly we do, and what exactly needs to be done to secure electronic assets.

The details of many professions are difficult to describe, so examples often offer the best means of explanation. Security is no different. In this book we hope to provide some insight into cyber security by using case studies to describe what a cyber security professional does.

We hope that this collection of case studies will serve as a tour of many of the issues that cyber security professionals face, not only in their careers but in their day-to-day lives.

One of the goals of this book, then, is to explain what we do; but there are other, more critical goals as well. Our primary aim is to provide practical examples of the types of issues that security professionals must be prepared to face in the execution of their duties.

Introduction

Part I: Basic Hacking

Chapter 1. Getting to Know the Enemy: Nmap the Target Network

Chapter 2. Home Architecture

Chapter 3. No Service for You!

Part II: Current Methods

Chapter 4. Look. Ma. No Wires!

Chapter 5. Virus Outbreak I

Chapter 6. Virus Outbreak II: The Worm

Chapter 7. Changing Face

Part III: Additional Kerns on the Plate

Chapter 8. Protecting Borders: Perimeter Defense with an IDS

Chapter 9. Disaster All Around

Chapter 10. Security Is the Best Policy

Chapter 11. HIPAA: Security by Regulation

Part IV: Old School

Chapter 12. A War-Dialing Attack

Chapter 13. A Low-Tech Path into the High-Tech World

Part V: Computer Forensics

Chapter 14. Industrial Espionage

Chapter 15. Executive Fraud

Chapter 16. Cyber Extortion

Appendix. Conclusion

Appendix. Recommended Reading

-

Какой программой открыть книгу?

-Опубликовано группой

Скачать