Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Buy

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer.

This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attackers exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur.

What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.

* Remember being a child and wanting to take something apart, like a phone, to see how it worked? This book is for you then as it details how specific hacker tools and techniques accomplish the things they do.

* This book will not only give you knowledge of security tools but will provide you the ability to design more robust security solutions

* Anyone can tell you what a tool does but this book shows you how the tool works

(HTML tags aren't allowed.)

Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis provides readers with a broad framework that covers the investment manager due diligence process from initial screening to analytical techniques, interviewing skills, and legal and contract negotiations. As it guides the reader through the selection process, it clearly demonstrates a variety of mechanisms for...
Play the Semi-slav
Play the Semi-slav

The Semi-Slav is one of the most popular chess openings that Black can play against 1.d4. The Semi-Slav is both sound and ambitious, which makes it a favourite of the chess elite. This book provides expert guidance on how to play this exciting variation. The author clearly explains which lines he recommends for Black and even offers a choice...

Energy Evolution (The Eco-Technology Series)
Energy Evolution (The Eco-Technology Series)
Coincidence? Or perhaps not! Standing as we are on the threshold of a new era, the first dawning of a new age, there is an air of expectancy of things imminent and better. In a certain sense this has psychologically programmed us with a willingness to embrace new concepts, to inaugurate and accept far-reaching change. It is also a time to reflect...

Ubuntu for Non-Geeks: A Pain-Free, Get-Things-Done Guide
Ubuntu for Non-Geeks: A Pain-Free, Get-Things-Done Guide

The Ubuntu Linux distribution makes Linux easy, and Ubuntu for Non-Geeks makes it even easier. Full of tips, tricks, and helpful pointers, this pain-free guide is perfect for those interested in—but nervous about—switching to the Linux operating system.

This revised and expanded fourth edition is...

SystemC: From the Ground Up
SystemC: From the Ground Up

SystemC provides a robust set of extensions to C++ that enables rapid development of complex hardware/software systems. This book focuses on the practical uses of the language for modeling real systems. The wealth of examples and downloadable code methodically guide the reader through the finer points of the SystemC language.

This work...

Structural Engineering, Mechanics and Computation
Structural Engineering, Mechanics and Computation
Hardbound. Following on from the International Conference on Structural Engineering, Mechanics and Computation, held in Cape Town in April 2001, this book contains the Proceedings, in two volumes. There are over 170 papers written by Authors from around 40 countries worldwide. The contributions include 6 Keynote Papers and 12 Special Invited...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy