Автор: Cardwell Название: Tactical Wireshark ISBN: 1484292901 ISBN-13(EAN): 9781484292907 Издательство: Springer Рейтинг: Цена: 7317.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest. Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial “click” through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level. In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation. After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool. What You Will Learn * Use Wireshark to identify intrusions into a network * Exercise methods to uncover network data even when it is in encrypted form * Analyze malware Command and Control (C2) communications and identify IOCs * Extract data in a forensically sound manner to support investigations * Leverage capture file statistics to reconstruct network events Who This Book Is For Network analysts, Wireshark analysts, and digital forensic analysts.
Автор: Quinn Kiser, Kiser Название: Ciberseguridad ISBN: 1954029616 ISBN-13(EAN): 9781954029613 Издательство: Неизвестно Рейтинг: Цена: 4137.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book is a concise guide to basic techniques in dermatologic surgery. Designed as a `how to`, quick reference text with a bullet point format and emphasis on demonstration, the book is invaluable for trainee and practising dermatologists. Authored by recognised, US-based expert Glenn Goldman, this book is highly illustrated with surgical photographs and diagrams.
Описание: Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you`ll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.
Описание: Kali Linux is considered as a reliable source for penetration testing and digital forensics. This book will give readers hands-on experience in utilizing Kali Linux tools to implement all the pillars of digital forensics such as acquisition, extraction, analysis, and presentation.
Описание: This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.*The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions.
Автор: Najera-Gutierrez Gilberto, Ahmed Ansari Juned, Teixeira Daniel Название: Improving your Penetration Testing Skills ISBN: 1838646078 ISBN-13(EAN): 9781838646073 Издательство: Неизвестно Рейтинг: Цена: 9194.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you`ll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
Автор: Tevault Donald a. Название: Mastering Linux Security and Hardening ISBN: 1788620305 ISBN-13(EAN): 9781788620307 Издательство: Неизвестно Рейтинг: Цена: 13424.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: For the past couple of decades, Linux has been extremely popular with systems administrators, for everything from creating networks and servers to automating their entire working environment. However, security has always been the major concern. With not many resources available in the Linux security domain, this book will be an invaluable ...
Автор: Tevault Donald a. Название: Mastering Linux Security and Hardening ISBN: 1838981772 ISBN-13(EAN): 9781838981778 Издательство: Неизвестно Рейтинг: Цена: 11585.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Hardening a Linux system can make it much more difficult for an attacker to exploit it. This book will enable system administrators and network engineers to protect their Linux systems, and the sensitive data on those systems.
Описание: Securing and hardening your Windows environment will enhance protection to secure your company`s data and users. This book will provide the knowledge you need to secure the Windows environment. Windows Security and Hardening covers the best practices you can implement in real-world scenarios.
Автор: Elisan Christopher Название: Advanced Malware Analysis ISBN: 0071819746 ISBN-13(EAN): 9780071819749 Издательство: McGraw-Hill Рейтинг: Цена: 12353.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: A one-of-a-kind guide to setting up a state-of-the-art malware research lab, using and customizing dozens of cutting-edge analysis tools, and generating metrics-rich reports to document the findings
Автор: Vasileios Karyotis Название: Malware Diffusion Models for Wireless Complex Networks ISBN: 0128027142 ISBN-13(EAN): 9780128027141 Издательство: Elsevier Science Рейтинг: Цена: 13980.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. . Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru