Defend I.T. : security by example /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boston :
Addison-Wesley,
©2004.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Basic hacking
- Ch. 1. Getting to know the enemy : Nmap the target network
- Ch. 2. Home architecture
- Ch. 3. No service for you!
- pt. II. Current methods
- Ch. 4. Look, Ma, no wires!
- Ch. 5. Virus outbreak I
- Ch. 6. Virus outbreak II : the worm
- Ch. 7. Changing face
- pt. III. Additional items on the plate
- Ch. 8. Protecting borders : perimeter defense with an IDS
- Ch. 9. Disaster all around
- Ch. 10. Security is the best policy
- Ch. 11. HIPAA : security by regulation
- pt. IV. Old school
- Ch. 12. war-dialing attack
- Ch. 13. low-tech path into the high-tech world
- pt. V. Computer forensics
- Ch. 14. Industrial espionage
- Ch. 15. Executive fraud
- Ch. 16. Cyber extortion.