Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Author:   Mike Schiffman ,  Bill Pennington ,  David Pollino ,  Adam O'Donnell
Publisher:   McGraw-Hill Education - Europe
Edition:   2nd edition
ISBN:  

9780072226300


Pages:   352
Publication Date:   16 December 2002
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $105.57 Quantity:  
Add to Cart

Share |

Hacker's Challenge 2: Test Your Network Security & Forensic Skills


Add your own review!

Overview

Hacker’s Challenge 2 provides 20 brand-new real-life hacking challenges for network professionals to solve and includes in-depth solutions written by experienced security consultants and authors of the first edition.

Full Product Details

Author:   Mike Schiffman ,  Bill Pennington ,  David Pollino ,  Adam O'Donnell
Publisher:   McGraw-Hill Education - Europe
Imprint:   McGraw-Hill Professional
Edition:   2nd edition
Dimensions:   Width: 18.50cm , Height: 2.10cm , Length: 23.10cm
Weight:   0.680kg
ISBN:  

9780072226300


ISBN 10:   0072226307
Pages:   352
Publication Date:   16 December 2002
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Part I: Challenges 1: Forced Byzantine Failure 2: Ssssh! Don't Tell Mom My Software Is Insecure 3: The Man with One Red Antenna 4: The Postman Always Sends Extra-Long Filenames 5: My Cup Runneth Over 6: The Kids Aren't Alright 7: Policy Predicament 8: When a Stranger Calls 9: How Bad Is It, Doc? 10: The Slippery NOP Slide 11: One Thing Leads to Another 12: The World Is Not Enough 13: You Won't Know Who to Trust 14: The Freeloader 15: Tunnel of Love 16: Do I Know You? 17: Off the Beaten Path 18: Injection Indigestion 19: The Insider II Part II: Solutions 1: Forced Byzantine Failure 2: Ssssh! Don't Tell Mom My Software Is Insecure 3: The Man with One Red Antenna 4: The Postman Always Sends Extra-Long Filenames 5: My Cup Runneth Over 6: The Kids Aren't Alright 7: Policy Predicament 8: When a Stranger Calls 9: How Bad Is It, Doc? 10: The Slippery NOP Slide 11: One Thing Leads to Another 12: The World Is Not Enough 13: You Won't Know Who to Trust 14: The Freeloader 15: Tunnel of Love 16: Do I Know You? 17: Off the Beaten Path 18: Injection Indigestion 19: The Insider II Appendix: Online Resources

Reviews

Author Information

Mike Schiffman, CISSP, has been involved in most every technical arena computer security has to offer. He has researched and developed many cutting edge technologies including tools such as firewalk and tracerx as well as the ubiquitously used low-level packet shaping library libnet. Mike has led audit teams through engagements for fortune 500 companies in the banking, automotive and manufacturing industries. He has spoken in front of several institutions and government agencies such as: NSA, CIA, DOD, AFWIC, SAIC, and army intelligence. Mike is the lead author of Hacker’s Challenge, and has written for numerous technical journals such as Software Magazine and has written articles for securityfocus.com, and authored many security white papers. Currently, Mike is the Director of Security Architecture for @stake, the leading provider of professional security services. Previous to @stake, Mike was the Director of Research and Development for Guardent, Inc. Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge. David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List