The Fictioning Horror Sale
 
 

Recently Viewed clear list


Original Essays | September 18, 2014

Lin Enger: IMG Knowing vs. Knowing



On a hot July evening years ago, my Toyota Tercel overheated on a flat stretch of highway north of Cedar Rapids, Iowa. A steam geyser shot up from... Continue »
  1. $17.47 Sale Hardcover add to wish list

    The High Divide

    Lin Enger 9781616203757

spacer
Qualifying orders ship free.
$34.25
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios

by

Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios Cover

 

Synopses & Reviews

Publisher Comments:

Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.

Synopsis:

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

Table of Contents

Part I: Challenges

Chapter 1: The French Connection

Chapter 2: The Insider

Chapter 3: The Parking Lot

Chapter 4: The Hinge Factor

Chapter 5: Maggie's Moment

Chapter 6: The Genome Injection

Chapter 7: Up in the Air

Chapter 8: The Tip of the Iceberg

Chapter 9: FDIC, Insecured

Chapter 10: Jack and Jill

Chapter 11: The Accidental Tourist

Chapter 12: Run for the Border

Chapter 13: Malpractice

Chapter 14: An Apple a Day

Chapter 15: A Thousand Razors

Chapter 16: One Hop Too Many

Chapter 17: Gluttony

Chapter 18: The Sharpest Tool in the Shed

Chapter 19: Omerta

Chapter 20: Nostalgia

Part II : Solutions

Chapter 1: The French Connection

Chapter 2: The Insider

Chapter 3: The Parking Lot

Chapter 4: The Hinge Factor

Chapter 5: Maggie's Moment

Chapter 6: The Genome Injection

Chapter 7: Up in the Air

Chapter 8: Tip of the Iceberg

Chapter 9: FDIC, Insecured

Chapter 10: Jack and Jill

Chapter 11: The Accidental Tourist

Chapter 12: Run for the Border

Chapter 13: Malpractice

(and more...)

Product Details

ISBN:
9780072193848
Author:
Schiffman, Mike
Publisher:
McGraw-Hill Companies
Location:
New York
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Security
Subject:
Computer hackers
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Subject:
Networking-Computer Security
Copyright:
Series Volume:
no. 221
Publication Date:
October 18, 2001
Binding:
TRADE PAPER
Language:
English
Illustrations:
Yes
Pages:
300
Dimensions:
9.25x7.50x.79 in. 1.45 lbs.

Other books you might like

  1. Hacking Exposed: Network Security... Used Trade Paper $5.95
  2. The Art of Software Security... Used Trade Paper $57.00
  3. File System Forensic Analysis New Trade Paper $79.99
  4. Professional Pen Testing for Web... New Trade Paper $45.00
  5. Cryptonomicon
    Used Trade Paper $3.50
  6. At Large: The Strange Case of the... Used Trade Paper $12.00

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios New Trade Paper
0 stars - 0 reviews
$34.25 In Stock
Product details 300 pages McGraw-Hill Companies - English 9780072193848 Reviews:
"Synopsis" by , "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.