EBOOK

About
The latest tactics for thwarting digital attacks
Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook."
• Obstruct APTs and web-based meta-exploits
• Defend against UNIX-based root access and buffer overflow hacks
• Block SQL injection, spear phishing, and embedded-code attacks
• Detect and terminate rootkits, Trojans, bots, worms, and malware
• Lock down remote access using smartcards and hardware tokens
• Protect 802.11 WLANs with multilayered encryption and gateways
• Plug holes in VoIP, social networking, cloud, and Web 2.0 services
• Learn about the latest iPhone and Android attacks and how to protect yourself
Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook."
• Obstruct APTs and web-based meta-exploits
• Defend against UNIX-based root access and buffer overflow hacks
• Block SQL injection, spear phishing, and embedded-code attacks
• Detect and terminate rootkits, Trojans, bots, worms, and malware
• Lock down remote access using smartcards and hardware tokens
• Protect 802.11 WLANs with multilayered encryption and gateways
• Plug holes in VoIP, social networking, cloud, and Web 2.0 services
• Learn about the latest iPhone and Android attacks and how to protect yourself
Related Subjects
Extended Details
- SeriesHacking Exposed