Details

Attack and Defend Computer Security Set


Attack and Defend Computer Security Set


1. Aufl.

von: Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, Ozh Richard

57,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 04.03.2014
ISBN/EAN: 9781118906774
Sprache: englisch
Anzahl Seiten: 1656

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Defend your networks and data from attack with this unique two-book security set</b> <p>The <i>Attack and Defend Computer Security Set</i> is a two-book set comprised of the bestselling second edition of <i>Web Application Hacker’s Handbook</i> and <i>Malware Analyst’s Cookbook</i>. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves.</p> <p>The <i>Web Application Hacker's Handbook</i> takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends and threats, this guide covers remoting frameworks, HTML5, and cross-domain integration techniques along with clickjacking, framebusting, HTTP parameter pollution, XML external entity injection, hybrid file attacks, and more.</p> <p>The <i>Malware Analyst's Cookbook</i> includes a book and DVD and is designed to enhance the analytical capabilities of anyone who works with malware. Whether you’re tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you go beyond the basic tools for tackling security challenges to cover how to extend your favorite tools or build your own from scratch using C, Python, and Perl source code. The companion DVD features all the files needed to work through the recipes in the book and to complete reverse-engineering challenges along the way.</p> <p>The <i>Attack and Defend Computer Security Set</i> gives your organization the security tools needed to sound the alarm and stand your ground against malicious threats lurking online.</p>
<b>WEB APPLICATION HACKER’S HANDBOOK 2E</b> <p>Chapter 1: Web Application (In)security 1</p> <p>Chapter 2: Core Defense Mechanisms 17</p> <p>Chapter 3: Web Application Technologies 39</p> <p>Chapter 4: Mapping the Application 73</p> <p>Chapter 5: Bypassing Client-Side Controls 117</p> <p>Chapter 6: Attacking Authentication 159</p> <p>Chapter 7: Attacking Session Management 205</p> <p>Chapter 8: Attacking Access Controls 257</p> <p>Chapter 9: Attacking Data Stores 287</p> <p>Chapter 10: Attacking Back-End Components 357</p> <p>Chapter 11: Attacking Application Logic 405</p> <p>Chapter 12: Attacking Users: Cross-Site Scripting 431</p> <p>Chapter 13: Attacking Users: Other Techniques 501</p> <p>Chapter 14: Automating Customized Attacks 571</p> <p>Chapter 15: Exploiting Information Disclosure 615</p> <p>Chapter 16: Attacking Native Compiled Applications 633</p> <p>Chapter 17: Attacking Application Architecture 647</p> <p>Chapter 18: Attacking the Application Server 669</p> <p>Chapter 19: Finding Vulnerabilities in Source Code 701</p> <p>Chapter 20: A Web Application Hacker’s Toolkit 747</p> <p>Chapter 21: A Web Application Hacker’s Methodology 791</p> <p><b>MALWARE ANALYST’S COOKBOOK AND DVD</b></p> <p>Chapter 1: Anonymizing Your Activities 1</p> <p>Chapter 2: Honeypots 27</p> <p>Chapter 3: Malware Classifi cation 51</p> <p>Chapter 4: Sandboxes and Multi-AV Scanners 89</p> <p>Chapter 5: Researching Domains and IP Addresses 119</p> <p>Chapter 6: Documents, Shellcode, and URLs 155</p> <p>Chapter 7: Malware Labs 211</p> <p>Chapter 8: Automation 239</p> <p>Chapter 9: Dynamic Analysis 283</p> <p>Chapter 10: Malware Forensics 337</p> <p>Chapter 11: Debugging Malware 395</p> <p>Chapter 12: De-Obfuscation 441</p> <p>Chapter 13: Working with DLLs 487</p> <p>Chapter 14: Kernel Debugging 511</p> <p>Chapter 15: Memory Forensics with Volatility 571</p> <p>Chapter 16: Memory Forensics: Code Injection and Extraction 601</p> <p>Chapter 17: Memory Forensics: Rootkits 637</p> <p>Chapter 18: Memory Forensics: Network and Registry 673</p>
<p><strong>Dafydd Stuttard</strong> has more than 10 years' experience in the area of web application security. He is the lead author of <em>Web Application Hacker's Handbook 1e and 2e</em>, has performed penetration testing training around the world. <p><strong>Marcus Pinto</strong> is co-author of <em>Web Application Hacker's Handbook</em> 1e and 2e and has over 10 years' experience within web application security. He has delivered a variety of training courses to technical audiences and speaks at security events around and outside of the UK. <p><strong>Michael Hale Ligh</strong> is the lead author of <em>The Malware Analyst's Cookbook</em> and Director of Malware Research of the The Volatility Project. Michael is a regular presenter at DefCon conferences. <p><strong>Matt Richard</strong> is and is the Malicious Code Operations Lead at Raytheon Corporation and has written a number of testing tools. <strong>Steven Adair</strong> is a security researcher with The Shadowserver Foundation and co-author of <em>The Malware Analyst's Cookbook</em> and deals with cyber attacks of all kinds esp. those linked to cyber espionage. <p><strong>Blake Hartstein</strong> conducts incident response and intrusion detection for Bloomberg and previously for VeriSign. The biggest and best companies worldwide depend on him for intelligence about attacks affecting their organization.

Diese Produkte könnten Sie auch interessieren:

From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
von: Thierry Priol, Marco Vanneschi
PDF ebook
96,29 €
Grid Computing
Grid Computing
von: Sergei Gorlatch, Paraskevi Fragopoulou, Thierry Priol
PDF ebook
149,79 €
Autonomic Communication
Autonomic Communication
von: Athanasios V. Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
PDF ebook
149,79 €