• Hacking Exposed 7: Network Security Secrets and Solutions See large image

    Hacking Exposed 7: Network Security Secrets and Solutions (Hacking Exposed: Network Security Secrets & Solutions) (Paperback) By (author) Stuart McClure, By (author) Joel Scambray, By (author) George Kurtz

    $33.49 - Save $21.39 38% off - RRP $54.88 Free delivery worldwide Available
    Dispatched in 2 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionThis is the latest tactics for thwarting digital attacks. "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." (Brett Wahlin, CSO, Sony Network Entertainment). "Stop taking punches - let's change the game; it's time for a paradigm shift in the way we secure our networks, and "Hacking Exposed 7" is the playbook for bringing pain to our adversaries." (Shawn Henry, former Executive Assistant Director, FBI). Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. "Hacking Exposed 7: Network Security Secrets and Solutions" contains all-new visual maps and a comprehensive "countermeasures cookbook." It features: obstruct APTs and web-based meta-exploits; defend against UNIX-based root access and buffer overflow hacks; block SQL injection, spear phishing, and embedded-code attacks; detect and terminate rootkits, Trojans, bots, worms, and malware; lock down remote access; using smartcards and hardware tokens; protect 802.11 WLANs with multilayered encryption and gateways; plug holes in VoIP, social networking, cloud, and Web 2.0 services; and learn about the latest iPhone and Android attacks and how to protect yourself.

Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10


Reviews | Bibliographic data
  • Full bibliographic data for Hacking Exposed 7

    Hacking Exposed 7
    Network Security Secrets and Solutions
    Authors and contributors
    By (author) Stuart McClure, By (author) Joel Scambray, By (author) George Kurtz
    Physical properties
    Format: Paperback
    Number of pages: 768
    Width: 185 mm
    Height: 229 mm
    Thickness: 41 mm
    Weight: 1,179 g
    ISBN 13: 9780071780285
    ISBN 10: 0071780289

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    LC subject heading:
    B&T Approval Code: A93661400, A93661500, A93663050
    Warengruppen-Systematik des deutschen Buchhandels: 16360
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading: ,
    BIC subject category V2: URH
    BISAC V2.8: COM043050
    Ingram Subject Code: XY
    BISAC V2.8: COM015000, COM060040, COM083000
    DC23: 005.8
    LC classification: TK5105.59 .M48 2012
    LC subject heading: ,
    Thema V1.0: URD, UTN, GPJ, URH, URY
    7, Revised
    Edition statement
    7th Revised edition
    McGraw-Hill Education - Europe
    Imprint name
    Publication date
    07 November 2012
    Publication City/Country
    New York
    Author Information
    Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004. Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition. George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee's Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee's CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.
    Table of contents
    1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service (DoS) Attacks