skip to content
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions Preview this item
ClosePreview this item
Checking...

Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions

Author: David Pollino; et al
Publisher: New York : McGraw-Hill, ©2006.
Edition/Format:   Book : EnglishView all editions and formats
Database:WorldCat
Summary:
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Hacker's challenge 3.
New York : McGraw-Hill, c2006
(OCoLC)645823778
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: David Pollino; et al
ISBN: 0072263040 9780072263046
OCLC Number: 69406046
Notes: Includes index.
Description: xxviii, 369 p. : ill. ; 24 cm.
Contents: pt. I. Challenges. To Catch a Phish --
Owning the Pharm --
Big Bait, Big Phish --
Shooting Phish in a Barrel --
Too Few Secrets --
Upgraded or "Owned?" --
Pale Blue Glow --
Crossing the Line --
The Root of the Problem --
Firewall Insights --
Peter LemonJello's "A Series of Unfortunate Events" --
Share and Share Alike --
The Holy Grail --
Open Source --
Cup of Chai --
Love Plus One --
Bullet in the Blue Sky --
The Insider III --
Jumping Someone Else's Train --
The Not-So-Usual Suspects --
pt. II. Solutions. To Catch a Phish --
Owning the Pharm --
Big Bait, Big Phish --
Shooting Phish in a Barrel --
Too Few Secrets --
Upgraded or "Owned?" --
Pale Blue Glow --
Crossing the Line --
The Root of the Problem --
Firewall Insights --
Peter LemonJello's "A Series of Unfortunate Events" --
Share and Share Alike --
The Holy Grail --
Open Source --
Cup of Chai --
Love Plus One --
Bullet in the Blue Sky --
The Insider III --
Jumping Someone Else's Train --
The Not-So-Usual Suspects.
Other Titles: Hacker's challenge three
Responsibility: David Pollino ... [et al.].
More information:

Abstract:

Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life security incidents that test computer forensics and response skills. It covers  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (1)

View most popular tags as: tag list | tag cloud

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/69406046>
library:oclcnum"69406046"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/69406046>
rdf:typeschema:Book
schema:about
<http://id.worldcat.org/fast/1751426>
rdf:typeschema:Intangible
schema:name"Internet--Security measures"@en
schema:name"Internet--Security measures."@en
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:about
schema:about
schema:about
schema:about
schema:contributor
schema:copyrightYear"2006"
schema:datePublished"2006"
schema:description"Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident."@en
schema:description"pt. I. Challenges. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects -- pt. II. Solutions. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1044415423>
schema:inLanguage"en"
schema:name"Hacker's challenge three"@en
schema:name"Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions"@en
schema:numberOfPages"369"
schema:publisher
schema:url
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA651545>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.