skip to content
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions Preview this item
ClosePreview this item
Checking...

Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions

Author: David Pollino; et al
Publisher: New York : McGraw-Hill, ©2006.
Edition/Format:   Book : EnglishView all editions and formats
Database:WorldCat
Summary:
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Hacker's challenge 3.
New York : McGraw-Hill, c2006
(OCoLC)645823778
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: David Pollino; et al
ISBN: 0072263040 9780072263046
OCLC Number: 69406046
Notes: Includes index.
Description: xxviii, 369 p. : ill. ; 24 cm.
Contents: pt. I. Challenges. To Catch a Phish --
Owning the Pharm --
Big Bait, Big Phish --
Shooting Phish in a Barrel --
Too Few Secrets --
Upgraded or "Owned?" --
Pale Blue Glow --
Crossing the Line --
The Root of the Problem --
Firewall Insights --
Peter LemonJello's "A Series of Unfortunate Events" --
Share and Share Alike --
The Holy Grail --
Open Source --
Cup of Chai --
Love Plus One --
Bullet in the Blue Sky --
The Insider III --
Jumping Someone Else's Train --
The Not-So-Usual Suspects --
pt. II. Solutions. To Catch a Phish --
Owning the Pharm --
Big Bait, Big Phish --
Shooting Phish in a Barrel --
Too Few Secrets --
Upgraded or "Owned?" --
Pale Blue Glow --
Crossing the Line --
The Root of the Problem --
Firewall Insights --
Peter LemonJello's "A Series of Unfortunate Events" --
Share and Share Alike --
The Holy Grail --
Open Source --
Cup of Chai --
Love Plus One --
Bullet in the Blue Sky --
The Insider III --
Jumping Someone Else's Train --
The Not-So-Usual Suspects.
Other Titles: Hacker's challenge three
Responsibility: David Pollino ... [et al.].
More information:

Abstract:

Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life security incidents that test computer forensics and response skills. It covers  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (1)

View most popular tags as: tag list | tag cloud

Similar Items

Related Subjects:(4)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/69406046>
library:oclcnum"69406046"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/69406046>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:contributor
schema:copyrightYear"2006"
schema:datePublished"2006"
schema:description"Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident."
schema:description"pt. I. Challenges. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects -- pt. II. Solutions. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1044415423>
schema:inLanguage"en"
schema:name"Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions"
schema:numberOfPages"369"
schema:publisher
schema:workExample
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA651545>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.