Seven Deadliest Network Attacks (syngress Seven Deadliest Attacks)

E-Book Overview

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

E-Book Content

About the Authors Stacy Prowell  is a senior research scientist in the Cyberspace Sciences and Information Intelligence Research Group at Oak Ridge National Laboratory (ORNL), where he conducts research on cyber security. Prior to joining ORNL, Stacy worked for the well-known CERT program at Carnegie Mellon University on automated reverse engineering and malware classification. As an industry consultant, Stacy has worked on projects ranging from small, embedded devices to large, distributed, real-time systems and has managed a variety of software development projects. Stacy is a cofounder of Software Silver Bullets, LLC, a company that develops tools to support rigorous software engineering methods. Stacy holds a PhD from the University of Tennessee and is a senior member of the IEEE and a member of the ACM and Sigma Xi. As this book was being written, Stacy and his family moved to Tennessee, where they now reside. He thanks his family, ­editors, coauthors, and employers for their amazing patience during this crazy time. Mike Borkin  (CCIE#319568, MCSE) is a director at PigDragon Security, a computer security consulting company, and an internationally known speaker and author. In his professional life, he has worked on developing strategies and securing the infrastructures of many different Fortune 500 companies at both an architectural and engineering level. He has spoken at conferences in both the United States and Europe for various industry groups including SANS, The Open Group, and RSA. This is his third book, having also contributed to Seven Deadliest Microsoft Attacks (Syngress, ISBN: 978-1-59749-551-6) and coauthored Windows Vista® Security for Dummies®. Mike wishes to thank the coauthors and editors of this book for their dedication and all the hard work that went into bringing it to fruition. He wants to thank his Phi Kappa Tau brothers from the University of Tennessee (Go Vols!) and say that without that brotherhood and the 20+ years of friendship with Stacy Prowell, he would probably be just a janitor. He also wants to thank his family and friends for putting up with him during the process, and especially Melissa (||) for what she has to deal with on an everyday basis. He especially hopes that the information in this book provides you with a better understanding of how to secure network environments while still taking the time to entertain. Rob Kraus  (CISSP, CEH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management, and client support while ensuring quality and timeliness of Solutionary’s products and services. Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration
You might also like

Pattern Classification
Authors: Richard O. Duda , Peter E. Hart , David G. Stork    156    0


Digital Image Processing: Piks Scientific Inside
Authors: William K. Pratt    157    0


Statistical Pattern Recognition
Authors: Andrew R. Webb    142    0


Fortran 90: A Conversion Course For Fortran 77 Programmers
Authors: Walter S. Brainerd , Charles H. Goldberg , Jeanne C. Adams    134    0


Synthesis And Optimization Of Dsp Algorithms
Authors: Constantinides , Cheung , Luk.    160    0



Using Ssh
   148    0


Tex, Xml, And Digital Typography: International Conference On Tex, Xml, And Digital Typography, Held Jointly With The 25th Annual Meeting Of The Tex Users Group, Tug 2004, Xanthi, Greece, August 30 - September 3, 2004. Proceedings
Authors: Christos K. K. Loverdos , Apostolos Syropoulos (auth.) , Apostolos Syropoulos , Karl Berry , Yannis Haralambous , Baden Hughes , Steven Peter , John Plaice (eds.)    101    0


Tex By Topic: A Texnician's Reference
Authors: Victor Eijkhout    127    0


Asp.net Web Developer's Guide
Authors: Scott Roberts    133    0