书目

Hacker'sChallenge3:20BrandNewForensicScenarios&Solutions

内容简介

Thestoriesaboutphishingattacksagainstbanksaresotrue-to-life,it’schilling.”—JoelDubin,CISSP,MicrosoftMVPinSecurityEveryday,hackersaredevisingnewwaystobreakintoyournetwork.Doyouhavewhatittakestostopthem?FindoutinHacker’sChallenge3.Inside,top-tiersecurityexpertsoffer20brand-new,real-worldnetworksecurityincidentstotestyourcomputerforensicsandresponseskills.Allthelatesthot-buttontopicsarecovered,includingphishingandpharmingscams,internalcorporatehacking,CiscoIOS,wireless,iSCSIstorage,VoIP,Windows,MacOSX,andUNIX/Linuxhacks,andmuchmore.Eachchallengeincludesa...

作者简介

DavidPollinohasastrongbackgroundinsecurity,wireless,andnetworking.Davidiscurrentlyasecuritypractitionerworkinginfinancialservices.Duringhiscareer,hehasworkedforanindustry-leadingsecurityconsultingcompany,alargefinancialservicescompany,andatier1ISP.Davidoftenspeaksatsecurityeventsandhasfrequentlybeenquotedinonlineandprintedjournalsregardingsecurityissues.Duringhiscareerasaconsultantandnetworkengineer,Davidhasworkedforclientsacrossmultipleindustries,includingfinancialservices,serviceproviders,hightechnology,manufacturing,andgovernment.Heco-authoredWirelessSecurity(RSAPress,2002)andHacker'sChallengeandHacker'sChallenge2(McGraw-Hill/Osborne,2001and2002,respectively).BillPennington,CISSP,hassixyearsofprofessionalexperienceininformationsecurityandelevenyearsininformationtechnology.HisdutiesatWhiteHatincludemanagingresearchanddevelopment,guidingproductandtechnologydirection,managingwebapplicationassessmentteams,anddevelopinganddeliveringWhiteHatSecuritytraining.Billhasperformedwebapplicationassessmentsformorethanfouryearsinavarietyofindustryverticalsincludingfinancialservices,e-commerce,andbiotechnology.HeisfamiliarwithMacOSX,Linux,Solaris,Windows,andOpenBSD,andheisaCertifiedInformationSecuritySystemsPractitioner(CISSP)andCertifiedCiscoNetworkAdministrator(CCNA).Hehasbroadexperienceinwebapplicationsecurity,penetrationtesting,computerforensics,andintrusiondetectionsystems.PriortojoiningWhiteHat,BillwasaprincipalconsultantandtechnicalleadforassessmentservicesatGuardent,anationwidesecurityservicesprovider.TonyBradley,CISSP-ISSAP,MCSE2k,haseightyearsofcomputernetworkingandadministrationexperience,focusingthelastfouronnetworksecurityandmalwareprotection.Tonyisanetworksecurityarchitectprovidingdesign,implementation,andmanagementofnetworksecuritysolutionsforavarietyofFortune500customers.HeisalsotheeditorandwriterfortheAbout.comInternet/NetworkSecuritywebsiteandfrequentlycontributestoavarietyoftechnicalandsecuritypublications,bothinprintandontheWeb.Youcanviewhiswritingportfolioathttp://www.s3kur3.com.HimanshuDwivediisafoundingpartnerofiSECPartners,anindependentproviderofinformationsecurityservicesandtools.Hehas12yearsofexperienceinsecurityandIT.BeforeformingiSEC,hewasTechnicalDirectorfor@stake'sBayAreasecuritypractice.Himanshu'sprofessionalfocusincludesstrategicsecurityservices,whichleverageshisexperiencewithsoftwaredevelopment,infrastructuresecurity,applicationsecurity,tooldevelopment,andsecureproductdesign.Heisconsideredanindustryexpertinstoragesecurity,specificallyFibreChannel/iSCSISANsandCIFS/NFSNASsystems.Himanshuhaspresentedatmajorsecurityconferencesthroughouttheworld,includingBlackHat,StorageNetworkingWorld,SyscanSingapore,andBelluaIndonesia.HimanshualsohasapatentpendingforastoragesecuritydesignarchitecturethatcanbeimplementedonenterprisestorageproductsforFibreChannelnetworks.Himanshuhasalsoauthoredtwoadditionalsecuritybooks,includingSecuringStorage:APracticalGuidetoSANandNASSecurity(Addison-Wesley,2005)andImplementingSSH:StrategiesforOptimizingtheSecureShell(Wiley,2003).

目录

—  END  —