Silence on the Wire
36%
off

Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks

By (author) M. Zalewski

US$26.07US$40.86

You save US$14.79

Free delivery worldwide

Available
Dispatched in 2 business days

When will my order arrive?

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems. Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

show more
  • Paperback | 312 pages
  • 175.3 x 233.7 x 25.4mm | 567g
  • 30 Apr 2005
  • No Starch Press,US
  • Daly City, California
  • English
  • 1593270461
  • 9781593270469
  • 241,789

Other books in this category

Other people who viewed this bought:

Review text

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.<p><i>Silence on the Wire</i> dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.</p>

show more