Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions /
The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security
Đã lưu trong:
Tác giả chính: | |
---|---|
Tác giả khác: | , |
Định dạng: | Sách |
Ngôn ngữ: | Vietnamese |
Được phát hành: |
American :
MC Graw Hill ,
2006
|
Phiên bản: | In lần thứ 1 |
Những chủ đề: | |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường CĐ Kỹ Thuật Cao Thắng |
---|
LEADER | 01766nam a2200265 a 4500 | ||
---|---|---|---|
001 | TVCDKTCT11867 | ||
003 | Thư viện trường Cao đẳng Kỹ thuật Cao Thắng | ||
005 | 20091116000000 | ||
008 | 091116 | ||
980 | \ | \ | |a Thư viện Trường CĐ Kỹ Thuật Cao Thắng |
024 | |a RG_1 #1 eb0 i1 | ||
020 | # | # | |a 0072263040 |
041 | 0 | # | |a vie |
082 | # | # | |a 005 / |b H100C-d |
100 | 1 | # | |a Dwivedi Himanshu |
245 | 0 | 0 | |a Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / |c Dwivedi Himanshu, Pennington Bill, Pollino David |
250 | # | # | |a In lần thứ 1 |
260 | # | # | |a American : |b MC Graw Hill , |c 2006 |
300 | # | # | |a 400tr. ; |c 24 cm |
520 | # | # | |a The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security |
520 | # | # | |a Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident. |
650 | # | 4 | |a Polpis Technology Solutions |
650 | # | 4 | |a Hackers Challenge |
700 | 0 | # | |a Pennington Bill |
700 | 0 | # | |a Pollino David |