Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Hack Proofing Your Network
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Hack Proofing Your Network

Hack Proofing Your Network

The Only Way to Stop a Hacker is to Think Like One

Collectif d'auteurs

790 pages, parution le 08/04/2002 (2eme édition)

Résumé

Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network.

  • Understand the Limitations of Wireless Security
  • Review how incomplete standards and changing protocols affect your networks
  • Establish Information Classification Procedures
  • Learn the 7 steps to establishing a classification system, which provides the first step in the creation of your security standards and policies
  • Understand the Broadcast Nature of Wireless
  • Learn about the most commonly used radio transmission protocols, including Frequency-Hopping Spread Spectrum (FHSS), Direct-Sequence Spread Spectrum (DRSS), and Infrared (IR)
  • Find Coverage of Sniffing, Interception, and Eavesdropping
  • Sniffing remains one of the most effective techniques in attacking a wireless network. Review sniffing and spoofing tools and protect against unauthorized attacks
  • Design and Deploy a Secure Network
  • Review the WEP authentication process and it's advantages and disadvantages.
  • Think Like a Hacker
  • Understand how hackers choose the tools and equipment required for an attack and see how their techniques like "war driving" can be used against you.
  • Read about Intrusion Detection Strategies
  • Watch for unauthorized traffic and protocols and review popular monitoring products
  • Design and Plan a Successful Audit
  • Learn the types of audits and best practices for auditing and security standard
  • Develop a Wireless Security Checklist
  • Follow the steps to show what type of equipment and planning will be necessary
  • Register for Your 1 Year Upgrade
  • The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!

Contents

Foreword v 1.5
Foreword v 1.0

1. How To Hack
2.The Laws of Security
3. Classes of Attack
4. Methodology
5. Diffing
6.Cryptography
7. Unexpected Input
8. Buffer Overflow
9. Format Strings
10. Sniffing
11. Session Hijacking
12. Spoofing : Attacks on Trusted Identity
13. Tunneling
14. Hardware Hacking
15. Viruses, Trojan Horses, and Worms
16. IDS Evasion
17. Automated Security Review and Attack Tools
18. Reporting Security Problems

Index

L'auteur - Collectif d'auteurs

Autres livres de Collectif d'auteurs

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Collectif d'auteurs
Parution 08/04/2002
Édition  2eme édition
Nb. de pages 790
Format 18,5 x 23,5
Couverture Broché
Poids 1383g
Intérieur Noir et Blanc
EAN13 9781928994701
ISBN13 978-1-928994-70-1

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription