Hacker's Challenge 3
Himanshu Dwivedi, Bill Pennington, Tony Bradley, et al.
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Naturwissenschaften, Medizin, Informatik, Technik / Informatik, EDV
Beschreibung
The stories about phishing attacks against banks are so true-to-life, it's chilling."e; --Joel Dubin, CISSP, Microsoft MVP in SecurityEvery day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you ll get a detailed analysis of how the experts solved each incident.