Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Infosec Career Hacking
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Infosec Career Hacking

Infosec Career Hacking

Sell Your Skillz, Not Your Soul

Aaron Bayles, Chris Hurley, Ed Brindley, James C. Foster, Johnny Long

450 pages, parution le 02/08/2005

Résumé

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses your home network just because you can? Do you spend countless hours coding applications for the sheer joy and challenge? Do you have a coin jar labeled "Trip to DEFCON/Black Hat Fund"? If you want to refine those skills to land a top InfoSec job and employer-funded trip to Vegas next year, you've come to the right place. The authors of this book have all succeeded in applying their inherent hacker skills to build successful InfoSec careers. From them you will learn about the variety of available jobs and the skills required to excel in each one. Also, the authors provide advice on how to develop the necessary management and personal skills required to hack your way to the top.

  • Determine What You Want to Be When You Grow Up (or at Least Get Older)
    See how the InfoSec field has matured, and decide if this is the life for you.
  • Social Engineering for Profit
    Use both your people and research skills to perform reconnaissance on the InfoSec job market.
  • Choose the Right Path
    Learn what certifications, work experience, and education are required (or not) to land your dream job.
  • There's No Place Like Home...for a Test Lab!
    Build a fully functional test lab and attack machine in your basement to fine-tune both your attack and defense skills.
  • Learn the Laws of Security
    Master the ten guiding principles of information security to outwit malicious hackers in the real world.
  • Know Your Enemies
    Identify and understand the classes of attack: denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, elevation of privileges.
  • Feeling Vulnerable?
    Navigate the dangerous waters of vulnerability disclosure from nondisclosure to full disclosure.
  • Don't Trip the Sensors
    Use your l337 H4x0r skillz to assimilate into the workplace and hack the corporate ladder.
  • Master Incident Response
    Develop contingency plans to put out fires in the workplace without getting burned.
  • Install Your Career Rootkit
    Since you got there, you might as well stay there!

L'auteur - James C. Foster

James C. Foster, Fellow is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Prior to CSC, Foster was the Director of Research and Development for Foundstone Inc. (acquired by McAfee) and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. (acquired by Verisign) and an adjunct author at Information Security Magazine (acquired byTechTarget), subsequent to working as Security Research Specialist for the Department of Defense. With his core competencies residing in high-tech remote management, international expansion, application security, protocol analysis, and search algorithm technology, Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercial-grade cryptography implementations.

Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the Microsoft Security Summit, Black Hat USA, Black Hat Windows, MIT Wireless Research Forum, SANS, MilCon, TechGov, InfoSec World 2001, and the Thomson Security Conference. He also is commonly asked to comment on pertinent security issues and has been sited in USAToday, Information Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist. Foster holds an A.S., B.S., MBA and numerous technology and management certifications and has attended or conducted research at the Yale School of Business, Harvard University, the University of Maryland, and is currently a Fellow at University of Pennsylvania's Wharton School of Business.

Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress Publishing, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker Toolkit, Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam Toolkit, and the forthcoming Google Hacking for Penetration Techniques (Syngress, ISBN: 1-931836-36-1) .

L'auteur - Johnny Long

Johnny Long has spoken on network security and Google hacking at several computer security conferences around the world including SANS, Defcon, and the Black Hat Briefings. During his recent career with Computer Sciences Corporation (CSC), a leading global IT services company, he has performed active network and physical security assessments for hundreds of government and commercial clients. His website, currently the Internet's largest repository of Google hacking techniques, can be found at http://johnny.ihackstuff.com.

Sommaire

  • Recon/Assessment
    • The Targets-What I Want to Be When I Grow Up (or at Least Get Older)
    • Reconnaissance: Social Engineering for Profit
    • Enumerate: Determine What's Out There
    • First Strike: Basic Tactics for Successful Exploitation
  • Technical Skills
    • The Laws of Security
    • No Place Like /home-Creating an Attack Lab
    • Vulnerability Disclosure
    • Classes of Attack
  • On the Job
    • Don't Trip the Sensors: Integrate and Imitate
    • Vulnerability Remediation-Work Within the System
    • Incident Response - Putting Out Fires Without Getting Burned
    • Rooting: Show Me the Money!
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Aaron Bayles, Chris Hurley, Ed Brindley, James C. Foster, Johnny Long
Parution 02/08/2005
Nb. de pages 450
Format 18 x 23
Couverture Broché
Poids 760g
Intérieur Noir et Blanc
EAN13 9781597490115
ISBN13 978-1-597490-11-5

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription