lunes, 4 de febrero de 2008

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking.

Edición: Syngress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Extending OSI to Network Security
  2. The Physical Layer
  3. Layer 2: The Data Link Layer
  4. Layer 3: The Network Layer
  5. Layer 4: The Transport Layer
  6. Layer 5: The Session Layer
  7. Layer 6: The Presentation Layer
  8. Layer 7: The Application Layer
  9. Layer 8: The People Layer
  10. Appendix A: Risk Mitigation: Securing the Stack

Descarga/Download

No hay comentarios: