Kod: 05074101
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage).Computer Network Exploitation"Strategic C ... więcej
Za ten zakup dostaniesz 122 punkty
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage).Computer Network Exploitation"Strategic Collection (leaked NSA programs)""Directed Collection (China stealing Patriot Missile designs)""Virtual Computer Network Attack (VCNA) (Russia vs. Estonia, Georgia)"The Attacker"Humanity ""Access ""Targeting Capabilities""Exploitation Expertise""Networking Expertise""Software Development Expertise"The Defender"Network Design""Security Policy""Defensive Life Cycle ""The Helpful Defender"Attacker Frictions"Flawed Attack Tools""Upgrades and Updates"Defender Frictions "Flawed Software and Updates"Offensive Strategy"Program Security""Attacker Liabilities""Program Security Costs"Defensive Strategy"Failed Tactics""Application Whitelisting""Network segmentation and segregation""Web domain whitelisting for all domains""Cloud Based Security"Offensive Case Studies "Stuxnet, Target, ATM thieves, etc.""Defensive strategies to prevent exploitation"
Kategoria Książki po angielsku Computing & information technology Computer networking & communications Network security
48.82 €
Osobní odběr Bratislava a 2642 dalších
Copyright ©2008-24 najlacnejsie-knihy.sk Wszelkie prawa zastrzeżonePrywatnieCookies
Nákupní košík ( prázdný )