Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

A Compendium of Neuropsychological Tests: Administration, Norms, and Commentary
A Compendium of Neuropsychological Tests: Administration, Norms, and Commentary
The Second Edition of this well-known Compendium has been considerably expanded and updated. It contains new chapters on test selection administration and preparation of the client; report writing and the informing interview; executive functions; occupational interest and aptitude; and malingering and symptom validity testing. The first four...
Bringing Out the Best in Everyone You Coach: Use the Enneagram System for Exceptional Results
Bringing Out the Best in Everyone You Coach: Use the Enneagram System for Exceptional Results

“Clearly written, well organized, and practical, we predict this will quickly become the ‘standard’ Enneagram coaching book for years to come.”
Don Richard Riso and Russ Hudson, bestselling authors of Personality Types and The Wisdom of the Enneagram

 

Create powerful...

Advertising, Promotion, and Other Aspects of Integrated Marketing Communications
Advertising, Promotion, and Other Aspects of Integrated Marketing Communications
The field of marketing communications is ever-changing. Brand managers continually attempt to gain advantage over competitors and endeavor to achieve larger market shares and profits for the brands they manage. Marketing communications, or marcom, is just one element of the marketing mix, but advertising, promotions,...

Pragmatic Programmer, The: From Journeyman to Master
Pragmatic Programmer, The: From Journeyman to Master

This book is aimed at people who want to become more effective and more productive programmers. Perhaps you feel frustrated that you don't seem to be achieving your potential. Perhaps you look at colleagues who seem to be using tools to make themselves more productive than you. Maybe your current job uses older technologies, and you...

Pro Hibernate and MongoDB (The Expert's Voice)
Pro Hibernate and MongoDB (The Expert's Voice)

Hibernate and MongoDB are a powerful combination of open source persistence and NoSQL technologies for today's Java-based enterprise and cloud application developers. Hibernate is the leading open source Java-based persistence, object relational management engine, recently repositioned as an object grid management engine. ...

Ruby Under a Microscope: An Illustrated Guide to Ruby Internals
Ruby Under a Microscope: An Illustrated Guide to Ruby Internals

Ruby is a powerful programming language with a focus on simplicity, but beneath its elegant syntax it performs countless unseen tasks.

Ruby Under a Microscope gives you a hands-on look at Ruby's core, using extensive diagrams and thorough explanations to show you how Ruby is implemented (no C skills
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy