Using real-world case studies, this guide distills the lessons of security incidents and identifies what went wrong, what went right, and what could be done better in the future. Gupta and Laliberte (both practicing security professionals) examine how losses could have been reduced or prevented, whether through better incident response or through better initial countermeasures. Supporting information, such as network diagrams and screen shots, help illustrate the discussion. Annotation © 2004 Book News, Inc., Portland, OR
Part I Basic Hacking
- Chapter 1 Getting to Know the Enemy: Nmap the
Target Network
- Chapter 2 Home Architecture
- Chapter 3 No Service for You!
Part II Current Methods
- Chapter 4 Look, Ma, No Wires!
- Chapter 5 Virus Outbreak I
- Chapter 6 Virus Outbreak II: The Worm
- Chapter 7 Changing Face
Part III Additional Items on the Plate
- Chapter 8 Protecting Borders: Perimeter Defense
with an IDS
- Chapter 9 Disaster All Around
- Chapter 10 Security Is the Best Policy
- Chapter 11 HIPAA: Security by Regulation
Part IV Old School
- Chapter 12 A War-Dialing Attack
- Chapter 13 A Low-Tech Path into the
High-Tech World
Part V Computer Forensics
- Chapter 14 Industrial Espionage
- Chapter 15 Executive Fraud
- Chapter 16 Cyber Extortion