Seven Deadliest Network AttacksBy
- Stacy Prowell, Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab
- Rob Kraus, CISSP, C|EH, MCSE; Senior Security Consultant for Solutionary, Inc.
- Mike Borkin, MCSE, GSEC Gold
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include:
- Denial of Service
- War Dialing
- Penetration "Testing"
- Protocol Tunneling
- Spanning Tree Attacks
- Password Replay
Paperback, 176 Pages
Published: April 2010
Attacks may and will change, but the principles, assumptions and practices being used will likely remain the same for quite some time, and the authors did a good job explaining them. And that is the real value of this book--Zeljka Zorz, Help Net Security"[Knapp] provides a quite readable introduction to industrial networks and how familiar security principles can be translated to apply in this complex area . Whether you are charged with defending an industrial network or curious about all the "buzz" over SCADA security, Knapp's book will provide a solid introduction to this fascinating area. Definitely a recommended read."--
Chapter 1: Denial of Service
Chapter 2: War DialingChapter 3: Penetration "Testing"
Chapter 4: Protocol TunnelingChapter 5: Spanning Tree Attacks
Chapter 6: Man-in-the-MiddleChapter 7: Password Replay