• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions

    Hacker's Challenge 3 by Pollino, David; Pennington, Bill; Bradley, Tony;

    20 Brand New Forensic Scenarios & Solutions

    Series: NETWORKING & COMM - OMG;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 45.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        21 971 Ft (20 925 Ft + 5% VAT)
      • Discount 10% (cc. 2 197 Ft off)
      • Discounted price 19 774 Ft (18 833 Ft + 5% VAT)

    21 971 Ft

    Availability

    cancelled

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 3
    • Publisher McGraw Hill
    • Date of Publication 16 June 2006

    • ISBN 9780072263046
    • Binding Paperback
    • No. of pages400 pages
    • Size 228x185x21 mm
    • Weight 663 g
    • Language English
    • 0

    Categories

    Short description:

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

    Exerpt from “Big Bait, Big Phish”:

    The Challenge: “Could you find out what’s going on with the gobi web server? Customer order e-mails aren’t being sent out, and the thing’s chugging under a big load…” Rob e-mailed the development team reminding them not to send marketing e-mails from the gobi web server…. “Customer service is worried about some issue with tons of disputed false orders….” Rob noticed a suspicious pattern with the “false” orders: they were all being delivered to the same P.O. box…He decided to investigate the access logs. An external JavaScript file being referenced seemed especially strange, so he tested to see if he could access it himself…. The attacker was manipulating the link parameter of the login.pl application. Rob needed to see the server side script that generated the login.pl page to determine the purpose….

    The Solution: After reviewing the log files included in the challenge, propose your assessment: What is the significance of the attacker’s JavaScript file? What was an early clue that Rob missed that might have alerted him to something being amiss? What are some different ways the attacker could have delivered the payload? Who is this attack ultimately targeted against? Then, turn to the experts' answers to find out what really happened.

    More

    Long description:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.



    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

    More

    Table of Contents:

    FOREWORD

    ACKNOWLEDGMENTS

    INTRODUCTION

    Part I: Challenges

    Chapter 1: To Catch a Phish

    Chapter 2: Owning the Pharm

    Chapter 3: Big Bait, Big Phish

    Chapter 4: Shooting Phish in a Barrel

    Chapter 5: Too Few Secrets

    Chapter 6: Upgraded or "Owned?"

    Chapter 7: Pale Blue Glow

    Chapter 8: Crossing the Line

    Chapter 9: The Root of the Problem

    Chapter 10: Firewall Insights

    Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

    Chapter 12: Share and Share Alike

    Chapter 13: The Holy Grail

    Chapter 14: Open Source

    Chapter 15: Cup of Chai

    Chapter 16: Love Plus One

    Chapter 17: Bullet in the Blue Sky

    Chapter 18: The Insider III

    Chapter 19: Jumping Someone Else's Train

    Chapter 20: The Not-So-Usual Suspects

    Part II: Solutions

    Chapter 1: To Catch a Phish

    Chapter 2: Owning the Pharm

    Chapter 3: Big Bait, Big Phish

    Chapter 4: Shooting Phish in a Barrel

    Chapter 5: Too Few Secrets

    Chapter 6: Upgraded or "Owned?"

    Chapter 7: Pale Blue Glow

    Chapter 8: Crossing the Line

    Chapter 9: The Root of the Problem

    Chapter 10: Firewall Insights

    Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

    Chapter 12: Share and Share Alike

    Chapter 13: The Holy Grail

    Chapter 14: Open Source

    Chapter 15: Cup of Chai

    Chapter 16: Love Plus One

    Chapter 17: Bullet in the Blue Sky

    Chapter 18: The Insider III

    Chapter 19: Jumping Someone Else's Train

    Chapter 20: The Not-So-Usual Suspects

    INDEX

    More

    0