Description
If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Table of Contents
Acknowledgments xxi Introduction xxiii
Chapter 1 Hardware and Gear 1
Chapter 2 Building a Software Test Platform 31
Chapter 3 Passive Information Gathering 63
Chapter 4 Detecting Live Systems 105
Chapter 5 Enumerating Systems 149
Chapter 6 Automated Attack and Penetration Tools 189
Chapter 7 Understanding Cryptographic Systems 225
Chapter 8 Defeating Malware 259
Chapter 9 Securing Wireless Systems 291
Chapter 10 Intrusion Detection 325
Chapter 11 Forensic Detection 365
Post a Comment