skip to content
Seven deadliest network attacks Preview this item
ClosePreview this item
Checking...

Seven deadliest network attacks

Author: Stacy J Prowell; Rob Kraus; Mike Borkin
Publisher: Amsterdam ; Boston : Syngress, ©2010.
Series: Syngress seven deadliest attacks series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Prowell, Stacy J.
Seven deadliest network attacks.
Amsterdam ; Boston : Syngress, ©2010
(DLC) 2010014462
(OCoLC)609304013
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Stacy J Prowell; Rob Kraus; Mike Borkin
ISBN: 9781597495509 1597495506
OCLC Number: 613962609
Description: 1 online resource (xiv, 142 pages) : illustrations.
Contents: Introduction --
Chapter 1: Denial of Service --
Chapter 2: War Dialing --
Chapter 3: Penetration "Testing" --
Chapter 4: Protocol Tunneling --
Chapter 5: Spanning Tree Attacks --
Chapter 6: Man-in-the-Middle --
Chapter 7: Password Replay. Denial of service --
War dialing --
Penetration "testing" --
Protocol tunneling --
Spanning tree attacks --
Man-in-the-middle --
Password replay.
Series Title: Syngress seven deadliest attacks series.
Responsibility: Stacy Prowell, Rob Kraus, Mike Borkin.

Abstract:

Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of  Read more...

Reviews

Editorial reviews

Publisher Synopsis

Attacks may and will change, but the principles, assumptions and practices being used will likely remain the same for quite some time, and the authors did a good job explaining them. And that is the Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/613962609>
library:oclcnum"613962609"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/613962609>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2010"
schema:creator
schema:datePublished"2010"
schema:description"Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable."@en
schema:description"Denial of service -- War dialing -- Penetration "testing" -- Protocol tunneling -- Spanning tree attacks -- Man-in-the-middle -- Password replay."@en
schema:description"Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/477685029>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Seven deadliest network attacks"@en
schema:publisher
schema:url<http://www.sciencedirect.com/science/book/9781597495493>
schema:url<http://site.ebrary.com/id/10408189>
schema:url
schema:url<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597495493>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={EE0A6916-0CBE-4E41-84F2-E89AFAB128CB}&Format=410>
schema:url<http://public.eblib.com/choice/publicfullrecord.aspx?p=566706>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=334679>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={EE0A6916-0CBE-4E41-84F2-E89AFAB128CB}&Format=50>
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.