Kód: 05074101
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage).Computer Network Exploitation"Strategic C ... celý popis
Nákupem získáte 134 bodů
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage).Computer Network Exploitation"Strategic Collection (leaked NSA programs)""Directed Collection (China stealing Patriot Missile designs)""Virtual Computer Network Attack (VCNA) (Russia vs. Estonia, Georgia)"The Attacker"Humanity ""Access ""Targeting Capabilities""Exploitation Expertise""Networking Expertise""Software Development Expertise"The Defender"Network Design""Security Policy""Defensive Life Cycle ""The Helpful Defender"Attacker Frictions"Flawed Attack Tools""Upgrades and Updates"Defender Frictions "Flawed Software and Updates"Offensive Strategy"Program Security""Attacker Liabilities""Program Security Costs"Defensive Strategy"Failed Tactics""Application Whitelisting""Network segmentation and segregation""Web domain whitelisting for all domains""Cloud Based Security"Offensive Case Studies "Stuxnet, Target, ATM thieves, etc.""Defensive strategies to prevent exploitation"
Zařazení knihy Knihy v angličtině Computing & information technology Computer networking & communications Network security
1342 Kč
Osobní odběr Praha, Brno a 12903 dalších
Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies
Nákupní košík ( prázdný )