|
![]() |
|||
|
||||
OverviewThis volume contains 20 challenges organized by increasing levels of complexity with one challenge per chapter. The challenges cover many areas of information security including Web content, VPNs, denial of service, wireless issues, e-commerce, and email attacks. Each challenge offers a statement of the problem, any background and ancillary information, complete evidence of problem, and specific questions to help the reader solve the problem. The solutions include in-depth analysis of what happened and how the scenario was solved, including specific answers to the questions posed at the end of each challenge. In addition to Mike Schiffman, experienced security consultants from a variety of top security firms contribute their expertise and challenges. Full Product DetailsAuthor: Mike SchiffmanPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 18.50cm , Height: 2.50cm , Length: 23.10cm Weight: 0.788kg ISBN: 9780072193848ISBN 10: 0072193840 Pages: 384 Publication Date: 16 November 2001 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of ContentsPart I: Challenges Chapter 1: The French Connection Chapter 2: The Insider Chapter 3: The Parking Lot Chapter 4: The Hinge Factor Chapter 5: Maggie's Moment Chapter 6: The Genome Injection Chapter 7: Up in the Air Chapter 8: The Tip of the Iceberg Chapter 9: FDIC, Insecured Chapter 10: Jack and Jill Chapter 11: The Accidental Tourist Chapter 12: Run for the Border Chapter 13: Malpractice Chapter 14: An Apple a Day Chapter 15: A Thousand Razors Chapter 16: One Hop Too Many Chapter 17: Gluttony Chapter 18: The Sharpest Tool in the Shed Chapter 19: Omerta Chapter 20: Nostalgia Part II : Solutions Chapter 1: The French Connection Chapter 2: The Insider Chapter 3: The Parking Lot Chapter 4: The Hinge Factor Chapter 5: Maggie's Moment Chapter 6: The Genome Injection Chapter 7: Up in the Air Chapter 8: Tip of the Iceberg Chapter 9: FDIC, Insecured Chapter 10: Jack and Jill Chapter 11: The Accidental Tourist Chapter 12: Run for the Border Chapter 13: Malpractice Chapter 14: An Apple a Day Chapter 15: A Thousand Razors Chapter 16: One Hop Too Many Chapter 17: Gluttony Chapter 18: The Sharpest Tool in the Shed Chapter 19: Omerta Chapter 20: NostalgiaReviewsAuthor InformationMike Schiffman, CISSP, has been involved in most every technical arena computer security has to offer. He has researched and developed many cutting edge technologies including tools such as firewalk and tracerx as well as the ubiquitously used low-level packet shaping library libnet. Mike has led audit teams through engagements for fortune 500 companies in the banking, automotive and manufacturing industries. He has spoken in front of several institutions and government agencies such as: NSA, CIA, DOD, AFWIC, SAIC, and army intelligence. Mike is the lead author of Hackers Challenge, and has written for numerous technical journals such as Software Magazine and has written articles for securityfocus.com, and authored many security white papers. Currently, Mike is the Director of Security Architecture for @stake, the leading provider of professional security services. Previous to @stake, Mike was the Director of Research and Development for Guardent, Inc. Tab Content 6Author Website:Countries AvailableAll regions |