Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Warrior

Buy
Security Warrior, 9780596005450 (0596005458), O'Reilly, 2004

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will try to describe the target reader.

As an example, you might enjoy this book if you already have experience with networking and are able to program in one or more languages. Although your interest in infosec might be new, you have already read at least a few technical books on the subject, such as Practical UNIX & Internet Security from O'Reilly. You found those books to be informative, and you would like to read more of the same, but hopefully covering newer topics and at a more advanced level. Rather than an introductory survey of security from the defensive side, you would like to see through an attacker's eyes.

You are already familiar with basic network attacks such as sniffing, spoofing, and denial-of-service. You read security articles and vulnerability mailing lists online, and you know this is the best way to broaden your education. However, you now want a single volume that can quickly ratchet your knowledge level upward by a few notches.

Instead of reading a simple catalog of software tools, you would like to delve deeper into underlying concepts such as packet fragmentation, overflow attacks, and operating system fingerprinting. You likewise want more on forensics, honeypots, and the psychological basis of social engineering. You also enjoy novel challenges such as implementing Bayesian intrusion detection and defending against wireless "airborne" viruses. Before buying into Microsoft's Trustworthy Computing initiative, you would like to delve deeper into Windows XP attacks and Windows Server weaknesses.

These are some of the topics we cover. Although some parts will necessarily be review for more advanced users, we also cover unique topics that might gratify even seasoned veterans. To give one example, we cover reverse code engineering (RCE), including the esoteric subjects of Linux and embedded RCE. RCE is indispensable for dissecting malicious code, unveiling corporate spyware, and extracting application vulnerabilities, but until this book it has received sparse coverage in the printed literature.

This book is not married to a particular operating system, since many of you are responsible for protecting mixed networks. We have chosen to focus on security from the attacking side, rather than from the defending side. A good way to build an effective defense is to understand and anticipate potential attacks.

(HTML tags aren't allowed.)

Modelling with AutoCAD 2002
Modelling with AutoCAD 2002
New features in AutoCAD 2002 are covered in this book, making it a useful refresher course for anyone using AutoCAD at this level, and those upgrading to the new software release. The course is also designed to be fully relevant to anyone using other recent releases, including AutoCAD 2000.

*A self-paced learning experience introducing
...
Your Personal Horoscope 2020
Your Personal Horoscope 2020

Your complete one-volume guide to the year 2020. This fantastic and in-depth book includes month-by-month forecasts for every sign and all you need to know to find out what is in store for you in the year ahead.

The only one-volume horoscope you’ll ever need.

Your essential guide to love, life and...

MIMO Radar Signal Processing
MIMO Radar Signal Processing
Multiple-Input Multiple-Output (MIMO) radar has been receiving increasing attention from researchers, practitioners, and funding agencies. This is the first book to present a comprehensive and coherent picture of this emerging field, which is likely to become the standard reference in the field. The book introduces recent developments in MIMO radar...

Parallel R
Parallel R

It’s tough to argue with R as a high-quality, cross-platform, open source statistical software product—unless you’re in the business of crunching Big Data. This concise book introduces you to several strategies for using R to analyze large datasets, including three chapters on using R and Hadoop together....

Hard Disk Drive: Mechatronics and Control (Control Engineering)
Hard Disk Drive: Mechatronics and Control (Control Engineering)

The hard disk drive (HDD) is an excellent example of the practical application of precision mechatronics. Hard Disk Drive: Mechatronics and Control describes the control aspects of an HDD, explains difficulties faced by designers, provides solutions, and highlights challenges of future-generation drives. Combining academic interests with...

PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
Today’s Web users expect exciting pages that are updated frequently and provide a customized experience. For them, Web sites are more like communities, to which they’ll return time and again. At the same time, Web-site administrators want sites that are easier to update and maintain, understanding...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy