Hacking Exposed 7: Network Security Secrets and Solutions
<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.</b></p><p><b><br></b></p><p><b>The latest tactics for thwarting digital attacks</b></p><p>€œOur new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker€s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.€ --Brett Wahlin, CSO, Sony Network Entertainment</p><p>€œStop taking punches--let€s change the game; it€s time for a paradigm shift in the way we secure our networks, and <i>Hacking Exposed 7</i> is the playbook for bringing pain to our adversaries.€ --Shawn Henry, former Executive Assistant Director, FBI</p><p>Bolster your system€s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker€s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. <i>Hacking Exposed 7: Network Security Secrets & Solutions</i> contains all-new visual maps and a comprehensive €œcountermeasures cookbook.€ </p><ul><li>Obstruct APTs and web-based meta-exploits</li><li>Defend against UNIX-based root access and buffer overflow hacks</li><li>Block SQL injection, spear phishing, and embedded-code attacks</li><li>Detect and terminate rootkits, Trojans, bots, worms, and malware </li><li>Lock down remote access using smartcards and hardware tokens</li><li>Protect 802.11 WLANs with multilayered encryption and gateways</li><li>Plug holes in VoIP, social networking, cloud, and Web 2.0 services</li><li>Learn about the latest iPhone and Android attacks and how to protect yourself</li></ul>