Extreme Exploits
   home   book   authors   downloads   tools   praise  
Cover Materials  |  Key Points  |  Intended Audience  |  Contents  |  Errata  

About the Book
 

 
Synopsis
 
Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with a checklist for developing defenses at the end of each chapter. You'll also be introduced to a winning methodology for custom vulnerability assessments including attack profiling and the theatre of war concept. Through in-depth explanations of underlying technologies, you'll learn to prepare your network and software from threats that don't yet exist. This is a must-have volume for anyone responsible for network security.
 
Key Points
  • Secure your critical domain name system (DNS) infrastructure
  • Ensure reliable Internet connectivity amidst a myriad of attacks
  • Implement effective intrusion detection and prevention technologies
  • Prevent e-mail abuse using advanced filtering, encryption, and other methods
  • Stop data theft and egress exploitation by altering packet filtering rules
  • Use IP sinkholes and backscatter analysis to trap and gain knowledge from scanning and infiltration attempts
  • Secure wireless networks using a variety of technologies
  • Create a customized vulnerability assessment methodology for your organization
  • Use proven digital forensics techniques to investigate attacks
  • Defend against viruses, worms, bots, Trojans, and other malicious code
  • Learn to protect your software from little-known vulnerabilities
Intended Audience
 
This book is meant for security practitioners and systems and network administrators of all skill levels. If you're a fellow information assurance analyst, you'll be pleased to find that our focus is not how to locate and compile tools, but instead we discuss how tools should be used and exactly how they work. You won't find concatenated manual pages or regurgitated web content here. Many of the examples provided include the use of open source software, but the concepts being discussed are applicable to commercial software solutions, which makes this book useful to both large and small organizations.
 
If you're a technical manager, you'll be pleased to find that our concise explanations of technology and techniques will help you navigate the jargon employed by software and equipment vendors and assist you in developing easily understandable synopses of threats and the countermeasures for your fellow managers. Likewise, our discussion of the concepts behind these defenses will make you a smarter buyer when it comes to information security solutions. Pay special attention to the Checklist for Developing Defenses section included at the end of most chapters. It provides a simple to do list of the most important tactical actions you can take today that will help keep your network safe. We hope technical managers will ask their staff what is being done with regard to each and every checklist item, thereby raising awareness and sharing knowledge that may have great impact on the security of your organization.

 
Contents
 
PART 1: Core Internet Infrastructure for Security Professionals

Chapter 1: Internet Infrastructure for Security Professionals
Chapter 2: ISP Security Practices: Separating Fact from Fiction
Chapter 3: Securing the Domain Name System

PART 2: Defending your Perimeter and Critical Internet Infrastructure: Why Today's Perimeter isn't Yesterday's Perimeter

Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: DMZs In-Depth
Chapter 7: Intrusion Detection and Prevention
Chapter 8: E-Mail Gateways, Filtering, and Redundancy
Chapter 9: Data Leaks - Exploiting Egress
Chapter 10: Sinkhole and Backscatter Tools
Chapter 11: Securing Wireless Networks

PART 3: Network Vulnerability Assessments: Beyond the Script Kiddie: Tools and Techniques for Security Professionals

Chapter 12: Patch Management
Chapter 13: Building a Theatre of War - The Winning Methodology for Vulnerability Assessments
Chapter 14: Performing the Assessment - Part I
Chapter 15: Performing the Assessment - Part II

PART 4: Designing Countermeasures for Tomorrow Threats

Chapter 16: Exploiting Digital Forensics
Chapter 17: Viruses, Worms, Trojans, and Malware
Chapter 18: Exploiting Software

 
Errata
 
Unpublished as yet.
 

©2006 VOSTROM  |  Regarding Privacy