It's Raining Books Sale
 
 

Recently Viewed clear list


Original Essays | September 15, 2014

Lois Leveen: IMG Forsooth Me Not: Shakespeare, Juliet, Her Nurse, and a Novel



There's this writer, William Shakespeare. Perhaps you've heard of him. He wrote this play, Romeo and Juliet. Maybe you've heard of it as well. It's... Continue »
  1. $18.19 Sale Hardcover add to wish list

    Juliet's Nurse

    Lois Leveen 9781476757445

spacer
Qualifying orders ship free.
$32.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

Seven Deadliest USB Attacks (Seven Deadliest Attacks)

by

Seven Deadliest USB Attacks (Seven Deadliest Attacks) Cover

 

Synopses & Reviews

Publisher Comments:

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. USB Hacksaw
  2. USB Switchblade
  3. USB Based Virus/Malicous Code Launch
  4. USB Device Overflow
  5. RAMdump
  6. Pod Slurping
  7. Social Engineering and USB Technology

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, learn techniques to make your computer and network impenetrable

Synopsis:

Keep up with the latest hacks, attacks, and exploits affecting USB technology. The authors highlight the best ways to defend against these vicious hacks with step-by-step instruction, and deliver techniques to make one's computer and network impenetrable.

Synopsis:

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

USB Switchblade

Podslurping

USB Hacksaw

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

About the Author

Brian Anderson started his security career as a USMC Military Police officer. During his tour in the USMC Brian also served as an instructor for weapons marksmanship, urban combat, building entry techniques and less than lethal munitions. He also took part in the Somalia humanitarian efforts and several training engagements in the Middle East. Brian’s technical experience began when he joined EDS where he became part of a leveraged team and specialized in infrastructure problem resolution, disaster recovery and design and security. His career progression was swift carrying him through security engineering and into architecture where he earned a lead role. Brian was a key participant in many high level security projects driven by HIPAA, PCI, SOX, FIPS and other regulatory compliance which included infrastructure dependent services, multi-tenant directories, IdM, RBAC, SSO, WLAN, full disk and removable media encryption, leveraged perimeter design and strategy. He has earned multiple certifications for client, server and network technologies. Brian has written numerous viewpoint and whitepapers for current and emerging technologies and is a sought out expert on matters of security, privacy and penetration testing. Brian is an avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.Barbara Anderson has worked in the information technology industry as a network and server security professional for over eleven years. During that time, she has been acting as a senior network security engineer who provides consulting and support for all aspects of network and security design. Barbara comes from a strong network security background and has extensive experience in enterprise design, implementation and life-cycle management. Barbara proudly served her country for over four years in the United States Air force and has enjoyed successful positions at EDS, SMU, Fujitsu, ACS and Fishnet Security. These experiences and interactions have allowed her to become an expert in enterprise security, product deployment and training.

CCSP, CISSP, CCNP, CCDP

Table of Contents

Introduction

Chapter 1: USB Hacksaw

Chapter 2: USB Switchblade

Chapter 3: USB Based Virus / Malicious Code Launch

Chapter 4: USB Device OverFlow

Chapter 5: USB Ramdump 

Chapter 6: Podslurping-A USB Problem

Chapter 7: Social Engineering and USB Come Together for a Brutal Attack

 

 

 

Product Details

ISBN:
9781597495530
Author:
Anderson, Brian
Publisher:
Syngress Publishing
Author:
Anderson, Barbara
Subject:
Enterprise Applications - General
Subject:
System Administration - Storage & Retrieval
Subject:
Information technology
Subject:
Security - General
Subject:
Hardware - Peripherals
Subject:
Computer security
Subject:
Computer networks -- Security measures.
Subject:
Business Software - General
Subject:
Networking-Computer Security
Series:
Seven Deadliest Attacks
Publication Date:
20100531
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
256
Dimensions:
9.25 x 7.5 in

Related Subjects

Business » Computers
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
Computers and Internet » Personal Computers » Peripherals
Computers and Internet » Software Engineering » Programming and Languages
History and Social Science » World History » General

Seven Deadliest USB Attacks (Seven Deadliest Attacks) New Trade Paper
0 stars - 0 reviews
$32.95 In Stock
Product details 256 pages Syngress Publishing - English 9781597495530 Reviews:
"Synopsis" by , Keep up with the latest hacks, attacks, and exploits affecting USB technology. The authors highlight the best ways to defend against these vicious hacks with step-by-step instruction, and deliver techniques to make one's computer and network impenetrable.
"Synopsis" by , How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

USB Switchblade

Podslurping

USB Hacksaw

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.