- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Contents
Acknowledgments. Introduction. Chapter 1 Hardware and Gear. Chapter 2 Building a Software Test Platform. Chapter 3 Passive Information Gathering. Chapter 4 Detecting Live Systems. Chapter 5 Enumerating Systems. Chapter 6 Automated Attack and Penetration Tools. Chapter 7 Understanding Cryptographic Systems. Chapter 8 Defeating Malware. Chapter 9 Securing Wireless Systems. Chapter 10 Intrusion Detection. Chapter 11 Forensic Detection. Appendix A About the DVD. Index.