Cargando…

Defend I.T. : security by example /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gupta, Ajay
Otros Autores: Laliberte, Scott
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Addison-Wesley, ©2004.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • pt. I. Basic hacking
  • Ch. 1. Getting to know the enemy : Nmap the target network
  • Ch. 2. Home architecture
  • Ch. 3. No service for you!
  • pt. II. Current methods
  • Ch. 4. Look, Ma, no wires!
  • Ch. 5. Virus outbreak I
  • Ch. 6. Virus outbreak II : the worm
  • Ch. 7. Changing face
  • pt. III. Additional items on the plate
  • Ch. 8. Protecting borders : perimeter defense with an IDS
  • Ch. 9. Disaster all around
  • Ch. 10. Security is the best policy
  • Ch. 11. HIPAA : security by regulation
  • pt. IV. Old school
  • Ch. 12. war-dialing attack
  • Ch. 13. low-tech path into the high-tech world
  • pt. V. Computer forensics
  • Ch. 14. Industrial espionage
  • Ch. 15. Executive fraud
  • Ch. 16. Cyber extortion.