Hacker's Challenge 3 20 Brand New Forensic Scenarios & Solutions

Hacker\'s Challenge 3
By:Dwivedi, Himanshu; Pennington, Bill; Bradley, Tony; Pollino, David;
Pub Date:May 16th 2006
Format:Paperback 400 pages
ISBN:0072263040 / 9780072263046
Your Price:$58.00 ADD TO CART
More Information




Main description

The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.


Table of contents

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

Part I: Challenges

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

Part II: Solutions

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

INDEX


Backcover

Author Information

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Mar 25th, 2016
Your Price: $20.00
Owl Image

Date: Jan 4th, 2016
Your Price: $60.00
Owl Image

Date: Nov 3rd, 2015
Your Price: $35.00
Owl Image

Date: Oct 5th, 2015
Your Price: $20.00
Owl Image

Date: Aug 3rd, 2015
Your Price: $50.00
Owl Image

Date: Jul 30th, 2015
Your Price: $50.00
Owl Image

Date: Jun 5th, 2015
Your Price: $50.00
Owl Image

Date: Jun 2nd, 2015
Your Price: $50.00
Owl Image

Date: May 11th, 2015
Your Price: $40.00
Owl Image

Date: Apr 2nd, 2015
Your Price: $25.00
Owl Image

Date: Mar 30th, 2015
Your Price: $25.00
Owl Image

Date: Mar 27th, 2015
Your Price: $25.00
Owl Image

Date: Mar 19th, 2015
Your Price: $60.00
Owl Image

Date: Mar 16th, 2015
Your Price: $60.00
Owl Image

Date: Feb 2nd, 2015
Your Price: $25.00