Book description:

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits

  • Defend against UNIX-based root access and buffer overflow hacks

  • Block SQL injection, spear phishing, and embedded-code attacks

  • Detect and terminate rootkits, Trojans, bots, worms, and malware

  • Lock down remote access using smartcards and hardware tokens

  • Protect 802.11 WLANs with multilayered encryption and gateways

  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services

  • Learn about the latest iPhone and Android attacks and how to protect yourself

Keywords: HACKING, NETWORK SECURITY, NETWORK SECURITY HACKS, NETWORK SECURITY MONITORING, NETWORK SECURITY ESSENTIALS, NETWORKING SECURITY SYSTEMS, HACKING EXPOSED, BLACK HAT, GRAY HAT, WHITE HAT, COMPUTER SECURITY, NETWORK SECURITY, WEB 2.0, HARDWARE, UBUNTU LINUX, WINDOWS SERVER 2008, CISCO, 7TH EDITION, ATTACKS, COUNTERMEASURES, ADVANCED PERSISTENT THREATS, INDUSTRIAL AUTOMATION, INFASTRUCTURE HACKS, WIRELESS SECURITY, SCADA PROTOCOL HACKS, MICROSOFT WINDOWS SERVER 2010, UBUNTU LINUX, HARDWARE, RFID, MALWARE, DATA THEFT, SERVER SECURITY, MOBILE SECURITY, ENDPOINT SECURITY, WEB SECURITY, EMBEDDED SYSTEMS HACKING, HACKING WINDOWS, HACKING UNIX, CYBERCRIME, ATPS, MOBILE HACKING, SOCIAL MEDIA HACKING, REMOTE CONNECTIVITY, REMOTE DEVICES, IT PROFESSIONALS, IT SECURITY, CISSP, CNE, CCSE, SECURITY ARCHITECTURE, MCAFEE, BLACK HAT, I-4, CSI, HACKING EXPOSED, MICROSOFT WINDOWS SERVER 2008, FOOTPRINTING, SCANNING, ENUMERATION, UNIX, REMOTE CONNECTIVITY, VOIP, NETWORK DEVICES, WIRELESS DEVICES, HARDWARE, CODE, BOTNET, APT, HACKING EXPOSED WEB 2.0, HACKING EXPOSED VOIP, HACKING EXPOSED WINDOWS, HACKING EXPOSED WEB APPLICATIONS, HACKING EXPOSED CISCO NETWORKS, GRAY HAT HACKING, HACKING EXPOSED WIRELESS, HACKING EXPOSED COMPUTER FORENSICS, 19 DEADLY SINS OF SOFTWARE SECURITY, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, HACKING EXPOSED COMPUTER FORENSICS, HACKING EXPOSED VIRTUALIZATION & CLOUD COMPUTING, IT SECURITY METRICS, SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) IMPLEMENTATION, IT AUDITING, CISSP BOXED SET

Your Access Options


Recommend to your librarian that your institution purchase access to this publication.