Seven Deadliest Network Attacks

Nonfiction, Computers, Advanced Computing, Computer Science, Networking & Communications, Computer Security, General Computing
Cover of the book Seven Deadliest Network Attacks by Stacy Prowell, Rob Kraus, Mike Borkin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stacy Prowell, Rob Kraus, Mike Borkin ISBN: 9781597495509
Publisher: Elsevier Science Publication: June 2, 2010
Imprint: Syngress Language: English
Author: Stacy Prowell, Rob Kraus, Mike Borkin
ISBN: 9781597495509
Publisher: Elsevier Science
Publication: June 2, 2010
Imprint: Syngress
Language: English
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack.
The book consists of seven chapters that deal with the following attacks: (i) denial of service; (ii) war dialing; (iii) penetration testing; (iv) protocol tunneling; (v) spanning tree attacks; (vi) man-in-the-middle; and (vii) password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data.
This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense.

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack.
The book consists of seven chapters that deal with the following attacks: (i) denial of service; (ii) war dialing; (iii) penetration testing; (iv) protocol tunneling; (v) spanning tree attacks; (vi) man-in-the-middle; and (vii) password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data.
This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense.

More books from Elsevier Science

Cover of the book Rapid Thermal Processing for Future Semiconductor Devices by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Transformation Optics-based Antennas by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Introduction to Biomedical Engineering by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Computational Methods for the Atmosphere and the Oceans by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Maternal Substance Abuse and the Developing Nervous System by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Wettability by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Google Hacking for Penetration Testers by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Mobile IPv6 by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Advances in Marine Biology by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Nanostructured Semiconductor Oxides for the Next Generation of Electronics and Functional Devices by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Child Abuse and Neglect by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book The Rapidly Transforming Chinese High-Technology Industry and Market by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Analog Circuits Cookbook by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Chitosan Based Biomaterials Volume 2 by Stacy Prowell, Rob Kraus, Mike Borkin
Cover of the book Advances in Heat Transfer by Stacy Prowell, Rob Kraus, Mike Borkin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy