InfoSec career hacking sell your skillz, not your soul

Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an...

Descripción completa

Detalles Bibliográficos
Autor principal: Bayles, Aaron W. (-)
Otros Autores: Brindley, Ed, Foster, James C., Hurley, Chris, Long, Johnny
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub c2005.
Colección:EBSCO Academic eBook Collection Complete.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b31536980*spi
Tabla de Contenidos:
  • The targets : what I want to be when I grow up (or at least get older)
  • Reconnaissance : social engineering for profit
  • Enumerate : determine what's out there
  • First Strike : basic tactics for successful exploitation
  • The laws of security
  • No place like /home : creating an attack lab
  • Vulnerability disclosure
  • Classes of attack
  • Don't trip the sensors : integrate and imitate
  • Vulnerability remediation : work within the system
  • Incident response : putting out fires without getting burned
  • Rooting : show me the money!