The stories about phishing attacks against banks are so true-to-life, itas chilling.a --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hackeras Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, youall get a detailed analysis of how the experts solved each incident.... 190-199, 338-342 compromised accounts, 190 customer service application, 193 high-level Visio network diagram, ... to craft and send, 202-220, 344-345 SPAN (Switch Port Analyzer) ports, 339 SPARC (Scalable Processor Architecture )anbsp;...
Title | : | Hacker's Challenge 3 : 20 Brand New Forensic Scenarios & Solutions |
Author | : | David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi |
Publisher | : | McGraw Hill Professional - 2006-04-25 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: