De som köpt den här boken har ofta också köpt CompTIA A+ Certification All-in-One Exam Guide,... av Mike Meyers (häftad).
Köp båda 2 för 989 krThomas M. Thomas II , CCIE No. 9360, CCSI, a networking professional for 15+ years, is now CIO at Qoncert (www.qoncert.com), a Cisco Gold and Learning Partner. His books include OSPF Network Design Solutions. Donald A. Stoddard Security+, MCP, has 10+ years of experience in information security. Now Information Assurance Officer for the Department of the Navy, he is responsible for policy development, analytical work, advisory services and decision-making related to Information Assurance for one of the U.S. Navy's premier R and D facilities. He was contributing author for Designing Cisco Networks.
Introduction xxii
Chapter 1 There Be Hackers Here! 1
Essentials First: Looking for a Target 2
Hacking Motivations 3
Targets of Opportunity 4
Are You a Target of Opportunity? 6
Targets of Choice 7
Are You a Target of Choice? 7
The Process of an Attack 9
Reconnaissance 9
Footprinting (aka Casing the Joint) 11
Scanning 18
Enumeration 23
Enumerating Windows 24
Gaining Access 26
Operating System Attacks 27
Application Attacks 27
Misconfiguration Attacks 28
Scripted Attacks 29
Escalating Privilege 30
Covering Tracks 31
Where Are Attacks Coming From? 32
Common Vulnerabilities, Threats, and Risks 33
Overview of Common Attacks and Exploits 36
Network Security Organizations 39
CERT Coordination Center 40
SANS 40
Center for Internet Security (CIS) 40
SCORE 41
Internet Storm Center 41
National Vulnerability Database 41
Security Focus 42
Learning from the Network Security Organizations 42
Chapter Summary 43
Chapter Review 43
Chapter 2 Security Policies 45
Responsibilities and Expectations 50
A Real-World Example 50
Who Is Responsible? You Are! 50
Legal Precedence 50
Internet Lawyers 51
Evolution of the Legal System 51
Criminal Prosecution 52
Real-World Example 52
Individuals Being Prosecuted 53
International Prosecution 53
Corporate Policies and Trust 53
Relevant Policies 54
User Awareness Education 54
Coming to a Balance 55
Corporate Policies 55
Acceptable Use Policy 57
Policy Overview 57
Purpose 58
Scope 58
General Use and Ownership 58
Security and Proprietary Information 59
Unacceptable Use 60
System and Network Activities 61
&...