Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

New Challenges in Gastrointestinal Endoscopy
New Challenges in Gastrointestinal Endoscopy

Gastrointestinal (GI) endoscopy has become indispensable in both diagnosis and treatment of GI disorders. It has been 10 years now since the first Endoscopy Forum Japan was held, and in that time, leading young endoscopists, including colleagues from Asia, Australia, Europe, and the United States, have participated in the forum, discussing...

Introduction to Clustering Large and High-Dimensional Data
Introduction to Clustering Large and High-Dimensional Data
"...this book may serve as a useful reference for scientists and engineers who need to understand the concepts of clustering in general and/or to focus on text mining applications. It is also appropriate for students who are attending a course in pattern recognition, data mining, or classification and are interested in learning more about...
Beginning XML, Second Edition
Beginning XML, Second Edition
Extensible Markup Language (XML) is a rapidly maturing technology with powerful real-world applications, particularly for the management, display, and transport of data. Together with its many related technologies, it has become the standard for data and document delivery on the Web.

This book teaches you all you need to know about XML –...


Learning PHP, MySQL, JavaScript, CSS & HTML5: A Step-by-Step Guide to Creating Dynamic Websites
Learning PHP, MySQL, JavaScript, CSS & HTML5: A Step-by-Step Guide to Creating Dynamic Websites
The 3rd edition of the best-selling introduction to using PHP & MySQL to create dynamic, interactive websites - also includes coverage of JavaScript, CSS, and HTML5.

Learn how to build interactive, data-driven websites--even if you don't have any previous programming experience. If you know how to build
...
Mastering Enterprise JavaBeans, 3rd Edition
Mastering Enterprise JavaBeans, 3rd Edition
The bestselling classic is back-and covers the new EJB 2.1 specification!

Building on the overwhelming success of his previous two editions, renowned author Ed Roman has returned-along with Enterprise JavaBeans (EJB) gurus Gerald Brose and Rima Patel Sriganesh-to offer you the inside scoop on the EJB 2.1 specification and related...

Why IPTV: Interactivity, Technologies, Services (Telecoms Explained)
Why IPTV: Interactivity, Technologies, Services (Telecoms Explained)
Find out how modern IPTV technologies will change your experience of television.

Internet Protocol Television (IPTV) is rapidly being deployed as a compliment service to existing distribution technologies.

Why IPTV? traces the changes in Internet Protocol Television since...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy