E-Book Details:
Title:
|
Hack proofing your network
|
Publisher:
|
Syngress
|
Author:
|
David R. Mirza Ahmad, Ryan Russell
|
Edition:
|
2nd, illustrated 2002
|
Format:
|
PDF
|
ISBN:
|
1928994709
|
EAN:
|
9781928994701
|
No.ofPages:
|
826
|
Book Description:
A new edition the most popular Hack Proofing book around.IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems
ABOUT THE AUTHOR:
Russell is MIS Manager at SecurityFocus.com, has served as an expert witness on security topics, and has done internal security investigation for a major software vendor. He has been working in the IT field for over 11 years. He has a BS degree in Computer Science.
FEATURES:
· Covers more methods of attack and hacker secrets
· Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books
· Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials
· A great addition to the bestselling "Hack Proofing..." series
· Windows 2000 sales have surpassed those of Windows NT
· Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp
Table of Contents:
UNIT - I
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs,
Buffer overflow & format string vulnerabilities, TCP session
hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks.
UNIT - II
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of operation, location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash Functions and HMAC.
UNIT - III
Public key cryptography principles, public key cryptography algorithms, digital signatures, digital
Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service.
UNIT - IV
Email privacy: Pretty Good Privacy (PGP) and S/MIME.
UNIT - V
IP
Security Overview, IP Security Architecture, Authentication Header,
Encapsulating Security Payload,Combining Security Associations and Key Management.
UNIT - VI
Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
UNIT - VII
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3.
Intruders, Viruses and related threats.
UNIT - VIII
Firewall Design principles, Trusted Systems. Intrusion Detection Systems.
0 comments:
Post a Comment