193. |
- Penetration Testing and Network Defense: Performing Host Reconnaissance
- By Andrew Whitaker, Daniel Newman
- Jun 2, 2006
- Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
|
194. |
- Wireless LAN Design
- By Catherine Paquet, Diane Teare
- Jun 2, 2006
- This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
|
195. |
- Intrusion Prevention: Signatures and Actions
- By Earl Carter, Jonathan Hogue
- May 26, 2006
- Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
|
196. |
- Home Network Router Security Secrets
- By Andy Walker
- Apr 7, 2006
- Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
|
197. |
- A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
- By Seth Fogie
- Mar 31, 2006
- Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
|
0 comments:
Post a Comment