LATEST DISCOUNTS & SALES: PROMOTIONS

Close Notification

Your cart does not contain any items

$138.95   $125.28

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Osborne/McGraw-Hill
16 June 2006
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

By:   , , ,
Imprint:   Osborne/McGraw-Hill
Country of Publication:   United States
Edition:   3rd edition
Dimensions:   Height: 229mm,  Width: 185mm,  Spine: 21mm
Weight:   690g
ISBN:   9780072263046
ISBN 10:   0072263040
Pages:   400
Publication Date:  
Audience:   General/trade ,  Professional and scholarly ,  ELT Advanced ,  Undergraduate
Format:   Paperback
Publisher's Status:   Unknown
"FOREWORDACKNOWLEDGMENTSINTRODUCTIONPart I: ChallengesChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or ""Owned?""Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's ""A Series of Unfortunate Events""Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or ""Owned?""Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's ""A Series of Unfortunate Events""Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX"

David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider. Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hackers Challenge. Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. At iSEC, Himanshu manages the firms product development efforts and co-manages the sales and marketing programs. Himanshu is also a renowned industry author with six security books published, including Mobile Application Security (McGraw Hill/Osborne), Hacking VoIP (No Starch Press), Hacking Exposed: Web 2.0 (McGraw Hill/Osborne), Hackers Challenge 3 (McGraw Hill/Osborne), Securing Storage (Addison Wesley), and Implementing SSH (Wiley). In addition to the books, Himanshu also has a patent pending on Fibre Channel security. Before starting iSEC Partners, Himanshu was the Regional Technical Director at @stake, Inc.

See Also