Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Aggressive Network Self-Defense
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Résumé

I'm Mad As Hell and I'm Not Gonna Take it Anymore!

There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's Internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good-it gives us the chance to truly think about each situation-and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.
Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com

  • When the Worm Turns…
    Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
  • Are You the Hunter or the Hunted?
    Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
  • Reverse Engineer Working Trojans, Viruses, and Keyloggers
    Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
  • To Catch a Thief…
    Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
  • Learn the Definition of "Hostile Corporate Takeover" in Cyberspace
    Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
  • Understand the Active Defense Algorithm Model (ADAM)
    Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
  • See What Can Happen when the Virtual World Meets the Real World
    Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
  • Where the Wild Things Are…
    Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
  • Implement Passive Strike-Back Technologies
    Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.

L'auteur - Seth Fogie

SETH FOGIE is currently Senior Security Consultant at VirusMD Corporation, where he moderates the firm's Internet Security Help forum. He served six years as a U.S. Navy Nuclear Engineer and earned his MCSE before becoming the Network Administrator for a large retail company.

L'auteur - Johnny Long

Johnny Long has spoken on network security and Google hacking at several computer security conferences around the world including SANS, Defcon, and the Black Hat Briefings. During his recent career with Computer Sciences Corporation (CSC), a leading global IT services company, he has performed active network and physical security assessments for hundreds of government and commercial clients. His website, currently the Internet's largest repository of Google hacking techniques, can be found at http://johnny.ihackstuff.com.

Sommaire

  • Foreword
  • Fictionalized Cases of Netwoork Strike-Back, Seld-Defense, and Revenge
    • PDA Perils: Revenge from the Palm of Your Hand
    • The Case of a WLAN Attacker: In the Booth
    • MD5: Exploiting the Generous
    • A VPN Victim's Story: Jack's Smirking Revenge
    • Network Protection: Cyber-Attacks Meet Physical Response
    • Network Insecurity: Taking Patch Management to the Masses
    • The Fight for the Primulus Network: Yasees vs Nathan
    • Undermining the Network: A Breach of Trust
  • The Technologies and Concepts Behind Network Strike Back
    • ADAM: Active Defense Algorithm and Model
    • Defending Your Right to Defend
    • MD5 to Be Considered Harmful Someday
    • When the Tables Turn: Passive Strike-Back
  • Index
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Neil R. Wyler, Neil Archibald, Seth Fogie, Chris Hurley, Dan Kaminsky, Johnny Long, Luke (aka PyrO) McOmie, Haroon Meer, Bruce Poter, Roelof Temmingh
Collection 4 Free Booklets Your Solutions Membership
Parution 25/04/2005
Nb. de pages 382
Format 17,5 x 23
Couverture Broché
Poids 658g
Intérieur Noir et Blanc
EAN13 9781931836203
ISBN13 978-1-931836-20-3

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription