Like This Site? 
 
RSS Feed Follow Us 

on Twitter! Be Our Fan!

Network Security Secrets and Solutions

Share this post!
 Vote this!


THIS INCLUDES :
·         Up-to-date techniques and countermeasures for preventing the exploitation of UNIX systems
·         New chapter on hacking code, covering the ways flaws get introduced into software and how best to prevent their ubiquitous spread
·         New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits
·         Updated denial of service chapter with from-the-trenches descriptions of largescale zombie attacks and practical countermeasures
·         Coverage of new web hacking tools and techniques, including HTTP response splitting and automated vulnerability scanners
·         Totally revised chapter on hacking Internet users, covering the newest IE exploits, online services security, sociotechnical attacks like phishing, and the newest malware techniques including Windows rootkits techniques
·         Coverage of new wireless hacks
·         New content on remote connectivity including VoIP hacking
·         New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots
·         New hacks using Google as a reconnaissance tool
·         An updated footprinting chapter that deals with all the inevitable changes in finding information from various internet databases
·         Brand-new case studies covering relevant and timely security attacks including Google, wireless, and Mac OS X hacks.                                                                                                                                                           More...




0 comments:

Post a Comment