Hack the Stack
Using Snort and Ethereal to Master the 8 Layers of An Insecure Network
Michael Gregg - Collection 4 Free Booklets Your Solutions Membership
Résumé
A Unique and Refreshing Look at Network Security
The first thing many people think of when they hear the word hack is some type of malicious activity. Although some hacks are malicious, many are not. Nonmalicious hacks are about exploring the details of programmable systems and learning how they really work. They are explored by those who want to understand every detail of a system and how to stretch the capabilities of these systems beyond what they were originally designed to do.
Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.
- Extend OSI to Network Security: Use the well-known Open Systems Interconnect (OSI) model to see security topics in a new way.
- Defend the Physical Layer: Learn ways to avoid the loss of physical security, which can result in total exposure.
- Attack and Defend the Data Link Layer: Examine methods like ARP spoofing, MAC flooding, and using honeytokens.
- Understand IP Attacks: Learn how spoofing and evasion tasks can undermine the network layer.
- Detect Scans on Your Network: Understand port scanning techniques and utilities such as Scanrand, Wireshark, and Nmap.
- Avoid the Effects of Session Hijacking: See how Ettercap can be used for both malicious activity and to protect the session layer.
- Protect the Confidentiality of a Transaction: Use protocols such as IPSec to secure communications between two hosts.
- Analyze DNS and Its Weaknesses: See how DNS is susceptible to attacks that could lead to DoS or provide attackers with information.
- Make the Case for Stronger Security: Perform asset identification and valuation procedures.
L'auteur - Michael Gregg
Michael Gregg is the president of Superior Solutions, Inc., a Houston-based security assessment and training firm. He has more than 20 years of experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree. Some of the certifications he maintains include the following: CISSP, MCSE, CCNA, CTT+, A+, N+, Security+, CIW Security Analyst, CEH, NSA IAM, SCNP, DCNP, CCE, and TICSA.
He has consulted and taught for many Fortune 500 companies. Although consulting consumes the bulk of Michael's time, he enjoys teaching. Michael has a proven reputation as a both dynamic and influential speaker. His delivery style is considered energetic and entertaining, yet insightful. Teaching and contributing to the written body of IT security knowledge is how Michael believes he can give something back to the community that has given him so much.
He is a member of the American College of Forensic Examiners and of the Texas Association for Educational Technology. When not working, Michael enjoys traveling and restoring muscle cars.
Sommaire
- Extending OSI to Network Security
- The Physical Layer
- Layer 2: The Data Link Layer
- Layer 3: The Network Layer
- Layer 4: The Transport Layer
- Layer 5: The Session Layer
- Layer 6: The Presentation Layer
- Layer 7: The Application Layer
- Layer 8: The People Layer
- Appendix A Risk Mitigation: Securing the Stack
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Michael Gregg |
Collection | 4 Free Booklets Your Solutions Membership |
Parution | 28/11/2006 |
Nb. de pages | 460 |
Format | 18 x 22,5 |
Couverture | Broché |
Poids | 670g |
Intérieur | Noir et Blanc |
EAN13 | 9781597491099 |
ISBN13 | 978-1-59749-109-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet