Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Syngress Force Emerging Threat Analysis - Robert Graham

Syngress Force Emerging Threat Analysis

From Mischief to Malicious

(Autor)

Buch | Softcover
500 Seiten
2006
Syngress Media,U.S. (Verlag)
978-1-59749-056-6 (ISBN)
CHF 66,30 inkl. MwSt
  • Keine Verlagsinformationen verfügbar
  • Artikel merken
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow’s Threats Today

This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the “best of” this year’s top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..


* From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.
* From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam.
* From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware.
* Also from Combating Spyware in the Enterprise, About.com’s security expert Tony Bradley covers the transformation of spyware.
* From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well.
* From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security.
* Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security.
* From RFID Security, Brad “Renderman” Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks.
* Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security.
* From Hack the Stack, security expert Michael Gregg covers attacking the people layer.
* Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks.

Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems?

Erscheint lt. Verlag 8.11.2006
Verlagsort Rockland, MA
Sprache englisch
Maße 152 x 229 mm
Gewicht 870 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 1-59749-056-3 / 1597490563
ISBN-13 978-1-59749-056-6 / 9781597490566
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
CHF 132,90