The Fictioning Horror Sale
 
 

Recently Viewed clear list


Powell's Q&A | September 3, 2014

Emily St. John Mandel: IMG Powell’s Q&A: Emily St. John Mandel



Describe your latest book. My new novel is called Station Eleven. It's about a traveling Shakespearean theatre company in a post-apocalyptic North... Continue »
  1. $17.47 Sale Hardcover add to wish list

    Station Eleven

    Emily St. John Mandel 9780385353304

spacer

On Order

$39.95
New Trade Paper
Currently out of stock.
Add to Wishlist
Qty Store Section
- Local Warehouse Networking- Computer Security

Silence on the Wire

by

Silence on the Wire Cover

 

Synopses & Reviews

Publisher Comments:

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.

Synopsis:

Written by a well-known figure in the security/hacking community, this book stimulates readers to think more creatively about security problems and focuses on non-trivial and significant problems, not hype. The captivating narrative examines the journey of a packet of information, from input to destination, the secrets it divulges, and the security problems it faces along the way.

Synopsis:

- Author is very well-known in the security/hacking community
- With a Foreword by Solar Designer (also the book's technical reviewer)
- Stimulates readers to think more creatively about security problems
- Focuses on non-trivial and significant problems, not hype

About the Author

Michal Zalewski is a security researcher who has worked on topics ranging from hardware and OS design principles to networking. He has published research on many security topics and has worked for the past eight years in the InfoSec field for a number of reputable companies, including two major telecommunications firms.

Table of Contents

Dedication; Foreword; Introduction; A Few Words about Me; About This Book; The Source; Chapter 1: I Can Hear You Typing; 1.1 The Need for Randomness; 1.2 The Security of Random Number Generators; 1.3 I/O Entropy: This Is Your Mouse Speaking; 1.4 Entropy Is a Terrible Thing to Waste; 1.5 Attack: The Implications of a Sudden Paradigm Shift; 1.6 Food for Thought; Chapter 2: Extra Efforts Never Go Unnoticed; 2.1 Boole's Heritage; 2.2 Toward the Universal Operator; 2.3 Toward the Material World; 2.4 A Nonelectric Computer; 2.5 A Marginally More Popular Computer Design; 2.6 From Logic Operators to Calculations; 2.7 From Electronic Egg Timer to Computer; 2.8 Turing and Instruction Set Complexity; 2.9 Implications: Subtle Differences; 2.10 In Practice; 2.11 Prevention; 2.12 Food for Thought; Chapter 3: Ten Heads of the Hydra; 3.1 Revealing Emissions: TEMPEST in the TV; 3.2 Privacy, Limited; Chapter 4: Working for the Common Good; Safe Harbor; Chapter 5: Blinkenlights; 5.1 The Art of Transmitting Data; 5.2 The Implications of Aesthetics; 5.3 Building Your Own Spy Gear . . .; 5.4 . . . And Using It with a Computer; 5.5 Preventing Blinkenlights Data Disclosure--and Why It Will Fail; 5.6 Food for Thought; Chapter 6: Echoes of the Past; 6.1 Building the Tower of Babel; 6.2 The Missing Sentence; 6.3 Food for Thought; Chapter 7: Secure in Switched Networks; 7.1 Some Theory; 7.2 Attacking the Architecture; 7.3 Prevention of Attacks; 7.4 Food for Thought; Chapter 8: Us versus Them; 8.1 Logical Blinkenlights and Their Unusual Application; 8.2 The Unexpected Bits: Personal Data All Around; 8.3 Wi-Fi Vulnerabilities; Out in the Wild; Chapter 9: Foreign Accent; 9.1 The Language of the Internet; 9.2 Internet Protocol; 9.3 Beyond Internet Protocol; 9.4 User Datagram Protocol; 9.5 Transmission Control Protocol Packets; 9.6 Internet Control Message Protocol Packets; 9.7 Enter Passive Fingerprinting; 9.8 Passive Fingerprinting in Practice; 9.9 Exploring Passive-Fingerprinting Applications; 9.10 Prevention of Fingerprinting; 9.11 Food for Thought: The Fatal Flaw of IP Fragmentation; Chapter 10: Advanced Sheep-Counting Strategies; 10.1 Benefits and Liabilities of Traditional Passive Fingerprinting; 10.2 A Brief History of Sequence Numbers; 10.3 Getting More Out of Sequence Numbers; 10.4 Delayed Coordinates: Taking Pictures of Time Sequences; 10.5 Pretty Pictures: TCP/IP Stack Gallery; 10.6 Attacking with Attractors; 10.7 Back to System Fingerprinting; 10.8 Preventing Passive Analysis; 10.9 Food for Thought; Chapter 11: In Recognition of Anomalies; 11.1 Packet Firewall Basics; 11.2 The Consequences of Masquerading; 11.3 Segment Size Roulette; 11.4 Stateful Tracking and Unexpected Responses; 11.5 Reliability or Performance: The DF Bit Controversy; 11.6 Food for Thought; Chapter 12: Stack Data Leaks; 12.1 Kristjan's Server; 12.2 Surprising Findings; 12.3 Revelation: Phenomenon Reproduced; 12.4 Food for Thought; Chapter 13: Smoke and Mirrors; 13.1 Abusing IP: Advanced Port Scanning; 13.2 Defense against Idle Scanning; 13.3 Food for Thought; Chapter 14: Client Identification: Papers, Please!; 14.1 Camouflage; 14.2 A (Very) Brief History of the Web; 14.3 A HyperText Transfer Protocol Primer; 14.4 Making HTTP Better; 14.5 Uncovering Treasons; 14.6 Prevention; 14.7 Food for Thought; Chapter 15: The Benefits of Being a Victim; 15.1 Defining Attacker Metrics; 15.2 Protecting Yourself: Observing Observations; 15.3 Food for Thought; The Big Picture; Chapter 16: Parasitic Computing, or How Pennies Add Up; 16.1 Nibbling at the CPU; 16.2 Practical Considerations; 16.3 Parasitic Storage: The Early Days; 16.4 Making Parasitic Storage Feasible; 16.5 Applications, Social Considerations, and Defense; 16.6 Food for Thought; Chapter 17: Topology of the Network; 17.1 Capturing the Moment; 17.2 Using Topology Data for Origin Identification; 17.3 Network Triangulation with Mesh-Type Topology Data; 17.4 Network Stress Analysis; 17.5 Food for Thought; Chapter 18: Watching the Void; 18.1 Direct Observation Tactics; 18.2 Attack Fallout Traffic Analysis; 18.3 Detecting Malformed or Misdirected Data; 18.4 Food for Thought; Closing Words; Bibliographic Notes; ; Updates;

Product Details

ISBN:
9781593270469
Author:
Zalewski, Michal
Publisher:
No Starch Press
Subject:
Computer networks
Subject:
Security
Subject:
Security measures
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Subject:
Networking-Computer Security
Subject:
IDS;evidence analysis;firewalls;forensics;honeypots;network monitoring;policy enforcement;privacy;security
Edition Description:
Print PDF
Publication Date:
20050431
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
312
Dimensions:
9.25 x 7 x 0.85 in 1.32 lb

Related Subjects

Arts and Entertainment » Art » Style and Design
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Silence on the Wire New Trade Paper
0 stars - 0 reviews
$39.95 Backorder
Product details 312 pages No Starch Press - English 9781593270469 Reviews:
"Synopsis" by ,
Written by a well-known figure in the security/hacking community, this book stimulates readers to think more creatively about security problems and focuses on non-trivial and significant problems, not hype. The captivating narrative examines the journey of a packet of information, from input to destination, the secrets it divulges, and the security problems it faces along the way.
"Synopsis" by , - Author is very well-known in the security/hacking community
- With a Foreword by Solar Designer (also the book's technical reviewer)
- Stimulates readers to think more creatively about security problems
- Focuses on non-trivial and significant problems, not hype
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.