Book description
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment
“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI
Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”
- Obstruct APTs and web-based meta-exploits
- Defend against UNIX-based root access and buffer overflow hacks
- Block SQL injection, spear phishing, and embedded-code attacks
- Detect and terminate rootkits, Trojans, bots, worms, and malware
- Lock down remote access using smartcards and hardware tokens
- Protect 802.11 WLANs with multilayered encryption and gateways
- Plug holes in VoIP, social networking, cloud, and Web 2.0 services
- Learn about the latest iPhone and Android attacks and how to protect yourself
Table of contents
- Cover Page
- Hacking Exposed ™ 7: Network Security Secrets & Solutions
- Copyright Page
- Dedication
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I Casing the Establishment
-
Part II Endpoint and Server Hacking
- Case Study: International Intrigue
-
4 Hacking Windows
- Overview
- Unauthenticated Attacks
- Authenticated Attacks
-
Windows Security Features
- Windows Firewall
- Automated Updates
- Security Center
- Security Policy and Group Policy
- Microsoft Security Essentials
- The Enhanced Mitigation Experience Toolkit
- Bitlocker and the Encrypting File System
- Windows Resource Protection
- Integrity Levels, UAC, and PMIE
- Data Execution Prevention (DEP)
- Windows Service Hardening
- Compiler-based Enhancements
- Coda: The Burden of Windows Security
- Summary
- 5 Hacking UNIX
- 6 Cybercrime and Advanced Persistent Threats
-
Part III Infrastructure Hacking
- Case Study: Read It and WEP
- 7 Remote Connectivity and VoIP Hacking
- 8 Wireless Hacking
- 9 Hacking Hardware
- Part IV Application and Data Hacking
- Part V Appendixes
- Index
Product information
- Title: Hacking Exposed 7, 7th Edition
- Author(s):
- Release date: July 2012
- Publisher(s): McGraw-Hill
- ISBN: 9780071780292
You might also like
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource …
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
video
Certified Ethical Hacker (CEH), 2nd Edition
An updated edition of this video title is available. Please go to Certified Ethical Hacker, Version …