0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Hacker's Challenge (Paperback): Mike Schiffman Hacker's Challenge (Paperback)
Mike Schiffman
R989 R842 Discovery Miles 8 420 Save R147 (15%) Ships in 10 - 15 working days

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bug-A-Salt 3.0 Yellow
R999 R749 Discovery Miles 7 490
EASY DRINK CUP - BOY 6M+
R190 Discovery Miles 1 900
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Bennett Read Steam Iron (2200W)
R520 Discovery Miles 5 200
Fly Repellent ShooAway (Black)(2 Pack)
R698 R578 Discovery Miles 5 780
The Equalizer 3
Denzel Washington Blu-ray disc R151 R141 Discovery Miles 1 410
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
BSwish Bwild Classic Marine Vibrator…
R779 R649 Discovery Miles 6 490
Microsoft Xbox Series Wireless…
R1,699 R1,589 Discovery Miles 15 890

 

Partners