Seven deadliest network attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure...

Full description

Saved in:
Bibliographic Details
Main Authors: Prowell, Stacy J.
Corporate Authors: Elsevier Science & Technology.
Group Author: Kraus, Rob.; Borkin, Mike.
Published: Syngress,
Publisher Address: Amsterdam ; Boston :
Publication Dates: 2010.
Literature type: eBook
Language: English
Series: Syngress seven deadliest attacks series
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781597495493
Summary: Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
Carrier Form: 1 online resource (xiv, 142 pages) : illustrations.
Bibliography: Includes bibliographical references and index.
ISBN: 9781597495509
1597495506
1282738259
9781282738256
Index Number: TK5105
CLC: TP393.08
Contents: Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.
Denial of service -- War dialing -- Penetration "testing" -- Protocol tunneling -- Spanning tree attacks -- Man-in-the-middle -- Password replay.