目前无货。
欢迎选购其他类似产品。
前翻 后翻
正在播放... 已暂停   您正在聆听的 Audible 音频版本的样品。
了解更多信息
查看全部 3 张图片

Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions 平装

4.6 颗星,最多 5 颗星 14 星级
|
|
分享
广告

显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
平装
 

click to open popover

无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • 点击此处下载Kindle iOS阅读软件
    iPhone/iPad/Mac
  • 点击此处下载Kindle Android阅读软件
    Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。

kcpAppSendButton


基本信息

  • 平装
  • 语种: 英语
  • ISBN: 0072263040
  • 条形码: 9780072263046
  • 商品尺寸: 18.8 x 2.3 x 23 cm
  • 商品重量: 662 g
  • ASIN: 0072263040
  • 用户评分: 分享我的评价
  • 您想告诉我们您发现了更低的价格?

商品描述

作者简介

David Pollino has a strong background in security, wireless, and networking. David is currently a security practitioner working in financial services. During his career, he has worked for an industry-leading security consulting company, a large financial services company, and a tier 1 ISP. David often speaks at security events and has frequently been quoted in online and printed journals regarding security issues. During his career as a consultant and network engineer, David has worked for clients across multiple industries, including financial services, service providers, high technology, manufacturing, and government. He co-authored Wireless Security (RSA Press, 2002) and Hacker's Challenge and Hacker's Challenge 2 (McGraw-Hill/Osborne, 2001 and 2002, respectively).

Bill Pennington, CISSP, has six years of professional experience in information security and eleven years in information technology. His duties at WhiteHat include managing research and development, guiding product and technology direction, managing web application assessment teams, and developing and delivering WhiteHat Security training. Bill has performed web application assessments for more than four years in a variety of industry verticals including financial services, e-commerce, and biotechnology. He is familiar with Mac OS X, Linux, Solaris, Windows, and OpenBSD, and he is a Certified Information Security Systems Practitioner (CISSP) and Certified Cisco Network Administrator (CCNA). He has broad experience in web application security, penetration testing, computer forensics, and intrusion detection systems. Prior to joining WhiteHat, Bill was a principal consultant and technical lead for assessment services at Guardent, a nationwide security services provider.

Tony Bradley, CISSP-ISSAP, MCSE2k, has eight years of computer networking and administration experience, focusing the last four on network security and malware protection. Tony is a network security architect providing design, implementation, and management of network security solutions for a variety of Fortune 500 customers. He is also the editor and writer for the About.com Internet/Network Security website and frequently contributes to a variety of technical and security publications, both in print and on the Web. You can view his writing portfolio at http://www.s3kur3.com.

Himanshu Dwivedi is a founding partner of iSEC Partners, an independent provider of information security services and tools. He has 12 years of experience in security and IT. Before forming iSEC, he was Technical Director for @stake's Bay Area security practice. Himanshu's professional focus includes strategic security services, which leverages his experience with software development, infrastructure security, application security, tool development, and secure product design. He is considered an industry expert in storage security, specifically Fibre Channel/iSCSI SANs and CIFS/NFS NAS systems. Himanshu has presented at major security conferences throughout the world, including Black Hat, Storage Networking World, Syscan Singapore, and Bellua Indonesia. Himanshu also has a patent pending for a storage security design architecture that can be implemented on enterprise storage products for Fibre Channel networks. Himanshu has also authored two additional security books, including Securing Storage: A Practical Guide to SAN and NAS Security (Addison-Wesley, 2005) and Implementing SSH: Strategies for Optimizing the Secure Shell (Wiley, 2003).

目录

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

Part I: Challenges

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

Part II: Solutions

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

INDEX


无顾客评论

5 星 (0%) 0%
4 星 (0%) 0%
3 星 (0%) 0%
2 星 (0%) 0%
1 星 (0%) 0%

评论该商品

与其他买家分享您的想法

此商品在美国亚马逊上最有用的商品评论

美国亚马逊: 4.5 颗星,最多 5 颗星 13 条评论
Alexandra
5.0 颗星,最多 5 颗星 Great for any level of expertise
2015年10月19日 - 已在美国亚马逊上发表
已确认购买
AFEEZ BABATUNDE
5.0 颗星,最多 5 颗星 Five Stars
2016年1月9日 - 已在美国亚马逊上发表
已确认购买
Sun
4.0 颗星,最多 5 颗星 Hackers
2012年8月6日 - 已在美国亚马逊上发表
已确认购买
Ben Burger
5.0 颗星,最多 5 颗星 Great
2013年9月24日 - 已在美国亚马逊上发表
已确认购买
Stephen Chapman
5.0 颗星,最多 5 颗星 Hacker's Challenge 3
2006年5月10日 - 已在美国亚马逊上发表
2 个人发现此评论有用