skip to content
Hacker's challenge : test your incident response skills using 20 scenarios Preview this item
ClosePreview this item
Checking...

Hacker's challenge : test your incident response skills using 20 scenarios

Author: Mike Schiffman
Publisher: New York : Osborne/McGraw-Hill, ©2001.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Schiffman, Mike.
Hacker's challenge.
New York : Osborne/McGraw-Hill, ©2001
(OCoLC)606626005
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Mike Schiffman
ISBN: 0072193840 9780072193848
OCLC Number: 48489500
Notes: Includes index.
Description: xxvi, 355 pages : illustrations ; 24 cm
Contents: Challenges --
The French Connection --
Industry: Software Engineering --
Attack Complexity: Low --
Prevention Complexity: Low --
Mitigation Complexity: Low --
The Insider --
Industry: Software Engineering --
Attack Complexity: Moderate --
Prevention Complexity: Moderate --
Mitigation Complexity: Hard --
The Parking Lot --
Industry: Commercial Online Retailer --
Attack Complexity: Moderate --
Prevention Complexity: Moderate --
Mitigation Complexity: Moderate --
The Hinge Factor --
Industry: Software Engineering --
Attack Complexity: Low --
Prevention Complexity: Low --
Mitigation Complexity: Moderate --
Maggie's Moment --
Industry: Computer Engineering --
Attack Complexity: Devilish --
Prevention Complexity: Moderate --
Mitigation Complexity: Moderate --
The Genome Injection --
Industry: Genetic Research --
Attack Complexity: Hard --
Prevention Complexity: Low --
Mitigation Complexity: Hard --
Up in the Air --
Industry: Software Engineering --
Attack Complexity: Devilish --
Prevention Complexity: Moderate --
Mitigation Complexity: Moderate --
The Tip of the Iceberg --
Industry: Financial Services --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Moderate --
FDIC, Insecured --
Industry: Online Banking --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Hard --
Jack and Jill --
Industry: Online Retail --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Low --
The Accidental Tourist --
Industry: Semiconductor Manufacturer --
Attack Complexity: Low --
Prevention Complexity: Hard --
Mitigation Complexity: Moderate --
Run for the Border --
Industry: Banking and Financial Services --
Attack Complexity: Devilish --
Prevention Complexity: Moderate --
Mitigation Complexity: Low --
Malpractice --
Industry: Health Care --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Moderate --
An Apple a Day --
Industry: High School/Community College Network --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Moderate --
A Thousand Razors --
Industry: Government Contractor --
Attack Complexity: Low --
Prevention Complexity: Hard --
Mitigation Complexity: Hard --
One Hop Too Many --
Industry: Civil Engineering --
Attack Complexity: Low --
Prevention Complexity: Low --
Mitigation Complexity: Hard --
Gluttony --
Industry: Network Engineering/Sales --
Attack Complexity: Low --
Prevention Complexity: Low --
Mitigation Complexity: Low --
The Sharpest Tool in the Shed --
Industry: Medical Diagnostic Equipment Engineering --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Hard --
Omerta --
Industry: University --
Attack Complexity: Devilish --
Prevention Complexity: Low --
Mitigation Complexity: Moderate --
Nostalgia --
Industry: Pharmaceutical/Web Hosting --
Attack Complexity: Moderate --
Prevention Complexity: Low --
Mitigation Complexity: Low --
Solutions --
The French Connection --
The Insider --
The Parking Lot --
The Hinge Factor --
Maggie's Moment --
The Genome Injection --
Up in the Air --
Tip of the Iceberg --
FDIC, Insecured --
Jack and Jill --
The Accidental Tourist --
Run for the Border --
Malpractice --
An Apple a Day --
A Thousand Razors --
One Hop Too Many --
Gluttony --
The Sharpest Tool in the Shed --
Omerta --
Nostalgia.
Responsibility: Mike Schiffman.
More information:

Abstract:

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/48489500> # Hacker's challenge : test your incident response skills using 20 scenarios
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "48489500" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/7752653#Topic/internet> ; # Internet
    schema:about <http://experiment.worldcat.org/entity/work/data/7752653#Topic/informatique> ; # Informatique
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/7752653#Topic/manuels> ; # Manuels
    schema:bookFormat bgn:PrintBook ;
    schema:copyrightYear "2001" ;
    schema:creator <http://viaf.org/viaf/12556422> ; # Mike Schiffman
    schema:datePublished "2001" ;
    schema:description "Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident."@en ;
    schema:description "Challenges -- The French Connection -- Industry: Software Engineering -- Attack Complexity: Low -- Prevention Complexity: Low -- Mitigation Complexity: Low -- The Insider -- Industry: Software Engineering -- Attack Complexity: Moderate -- Prevention Complexity: Moderate -- Mitigation Complexity: Hard -- The Parking Lot -- Industry: Commercial Online Retailer -- Attack Complexity: Moderate -- Prevention Complexity: Moderate -- Mitigation Complexity: Moderate -- The Hinge Factor -- Industry: Software Engineering -- Attack Complexity: Low -- Prevention Complexity: Low -- Mitigation Complexity: Moderate -- Maggie's Moment -- Industry: Computer Engineering -- Attack Complexity: Devilish -- Prevention Complexity: Moderate -- Mitigation Complexity: Moderate -- The Genome Injection -- Industry: Genetic Research -- Attack Complexity: Hard -- Prevention Complexity: Low -- Mitigation Complexity: Hard -- Up in the Air -- Industry: Software Engineering -- Attack Complexity: Devilish -- Prevention Complexity: Moderate -- Mitigation Complexity: Moderate -- The Tip of the Iceberg -- Industry: Financial Services -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Moderate -- FDIC, Insecured -- Industry: Online Banking -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Hard -- Jack and Jill -- Industry: Online Retail -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Low -- The Accidental Tourist -- Industry: Semiconductor Manufacturer -- Attack Complexity: Low -- Prevention Complexity: Hard -- Mitigation Complexity: Moderate -- Run for the Border -- Industry: Banking and Financial Services -- Attack Complexity: Devilish -- Prevention Complexity: Moderate -- Mitigation Complexity: Low -- Malpractice -- Industry: Health Care -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Moderate -- An Apple a Day -- Industry: High School/Community College Network -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Moderate -- A Thousand Razors -- Industry: Government Contractor -- Attack Complexity: Low -- Prevention Complexity: Hard -- Mitigation Complexity: Hard -- One Hop Too Many -- Industry: Civil Engineering -- Attack Complexity: Low -- Prevention Complexity: Low -- Mitigation Complexity: Hard -- Gluttony -- Industry: Network Engineering/Sales -- Attack Complexity: Low -- Prevention Complexity: Low -- Mitigation Complexity: Low -- The Sharpest Tool in the Shed -- Industry: Medical Diagnostic Equipment Engineering -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Hard -- Omerta -- Industry: University -- Attack Complexity: Devilish -- Prevention Complexity: Low -- Mitigation Complexity: Moderate -- Nostalgia -- Industry: Pharmaceutical/Web Hosting -- Attack Complexity: Moderate -- Prevention Complexity: Low -- Mitigation Complexity: Low -- Solutions -- The French Connection -- The Insider -- The Parking Lot -- The Hinge Factor -- Maggie's Moment -- The Genome Injection -- Up in the Air -- Tip of the Iceberg -- FDIC, Insecured -- Jack and Jill -- The Accidental Tourist -- Run for the Border -- Malpractice -- An Apple a Day -- A Thousand Razors -- One Hop Too Many -- Gluttony -- The Sharpest Tool in the Shed -- Omerta -- Nostalgia."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/7752653> ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/606626005> ;
    schema:name "Hacker's challenge : test your incident response skills using 20 scenarios"@en ;
    schema:productID "48489500" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/48489500#PublicationEvent/new_york_osborne_mcgraw_hill_2001> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/7752653#Agent/osborne_mcgraw_hill> ; # Osborne/McGraw-Hill
    schema:url <http://catdir.loc.gov/catdir/toc/mh023/2002277030.html> ;
    schema:workExample <http://worldcat.org/isbn/9780072193848> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA243229> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/48489500> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/7752653#Agent/osborne_mcgraw_hill> # Osborne/McGraw-Hill
    a bgn:Agent ;
    schema:name "Osborne/McGraw-Hill" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/12556422> # Mike Schiffman
    a schema:Person ;
    schema:familyName "Schiffman" ;
    schema:givenName "Mike" ;
    schema:name "Mike Schiffman" ;
    .

<http://worldcat.org/isbn/9780072193848>
    a schema:ProductModel ;
    schema:isbn "0072193840" ;
    schema:isbn "9780072193848" ;
    .

<http://www.worldcat.org/oclc/606626005>
    a schema:CreativeWork ;
    rdfs:label "Hacker's challenge." ;
    schema:description "Online version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/48489500> ; # Hacker's challenge : test your incident response skills using 20 scenarios
    .

<http://www.worldcat.org/title/-/oclc/48489500>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/48489500> ; # Hacker's challenge : test your incident response skills using 20 scenarios
    schema:dateModified "2018-01-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.