The Good, the Bad, and the Hungry Sale
 
 

Recently Viewed clear list


Original Essays | June 20, 2014

Lisa Howorth: IMG So Many Books, So Many Writers



I'm not a bookseller, but I'm married to one, and Square Books is a family. And we all know about families and how hard it is to disassociate... Continue »

spacer
Qualifying orders ship free.
$26.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Remote Warehouse Networking- Computer Security

More copies of this ISBN

Seven Deadliest Microsoft Attacks

by

Seven Deadliest Microsoft Attacks Cover

 

Synopses & Reviews

Publisher Comments:

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

    Windows Operating System - Password Attacks

    Active Directory - Escalation of Privilege

    SQL Server - Stored Procedure Attacks

    Exchange Server - Mail Service Attacks

    Office - Macros and ActiveX

    Internet Information Services (IIS) - Web Service Attacks

    SharePoint - Multi-Tier Attacks

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Synopsis:

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

Code Red

SQL Slammer

Windows Metafile Vulnerability

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Synopsis:

This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make a system more secure.

Synopsis:

Identify. Conquer. Defend.

Synopsis:

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  1. Windows Operating System-Password Attacks
  2. Active Directory-Escalation of Privilege
  3. SQL Server-Stored Procedure Attacks
  4. Exchange Server-Mail Service Attacks
  5. Office-Macros and ActiveX
  6. Internet Information Serives(IIS)-Web Serive Attacks
  7. SharePoint-Multi-tier Attacks

About the Author

Rob Kraus (CISSP, C|EH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management and client support while ensuring quality and timeliness of Solutionary's products and services. Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers. Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks. Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.Mike Borkin (MCSE, GSEC Gold) is an internationally recognized author and speaker in the area of IT security where he focuses mostly on data protection strategies, Microsoft security, and security architecture/engineering best practices. In addition to contributing articles related to security to magazines and speaking engagements for groups such as SANS and The Open Group in both the US and Europe, Mike is also the Co-Author of Vista Security for Dummies.Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.

Consultant, Unified Communications, Microsoft, USA, Citrix Certified Enterprise Administrator, Security+, Network+, A+, MCSE, MCT

Table of Contents

Introduction Chapter 1: Windows Operating System-Password Attacks Chapter 2: Active Directory-Escalation of Privilege Chapter 3: SQL Server-Stored Procedure Attacks Chapter 4: Exchange Server-Mail Service Attacks Chapter 5: Office-Macros and ActiveX Chapter 6: Internet Information Services-Web Service Attacks Chapter 7: SharePoint-Multi-tier Attacks

Product Details

ISBN:
9781597495516
Author:
Kraus, Robert
Publisher:
Syngress Publishing
Author:
Kraus, Rob
Author:
Barber, Brian
Author:
Borkin, Mike
Subject:
Information technology
Subject:
Operating Systems - General
Subject:
Security - General
Subject:
General Computers
Subject:
Internet-Information
Copyright:
Series:
Seven Deadliest Attacks
Publication Date:
20100331
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
192
Dimensions:
9.25 x 7.5 in

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Operating Systems » General
Sports and Outdoors » Outdoors » Mountaineering » General

Seven Deadliest Microsoft Attacks New Trade Paper
0 stars - 0 reviews
$26.95 In Stock
Product details 192 pages Syngress Publishing - English 9781597495516 Reviews:
"Synopsis" by , How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

Code Red

SQL Slammer

Windows Metafile Vulnerability

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

"Synopsis" by , This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make a system more secure.
"Synopsis" by , Identify. Conquer. Defend.
"Synopsis" by , Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  1. Windows Operating System-Password Attacks
  2. Active Directory-Escalation of Privilege
  3. SQL Server-Stored Procedure Attacks
  4. Exchange Server-Mail Service Attacks
  5. Office-Macros and ActiveX
  6. Internet Information Serives(IIS)-Web Serive Attacks
  7. SharePoint-Multi-tier Attacks

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.