Hacking Exposed Cisco Networks
来源:互联网 发布:找小项目源码去哪儿? 编辑:程序博客网 时间:2024/05/22 11:38
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals.
*Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
*Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
*Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
*Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
*Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
*Find out how IOS exploits are written and if a Cisco router can be used as an attack platform Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
*Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
http://rapidshare.com/files/50548802/0072259175.rar
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals.
*Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
*Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
*Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
*Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
*Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
*Find out how IOS exploits are written and if a Cisco router can be used as an attack platform Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
*Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
http://rapidshare.com/files/50548802/0072259175.rar
- Hacking Exposed Cisco Networks
- Hacking Exposed Wireless
- Hacking Exposed Linux
- hacking exposed VOIP: preface
- hacking exposed 作业
- cisco hacking
- Hacking Exposed - 2nd Edition
- Hacking Exposed 5th Edition
- Hacking Exposed Windows: Microsoft Windows Security Secrets and, Solutions, Third Edition (Hacking Exposed) (Paperback)
- Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
- Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions, (Hacking Exposed) (Paperback) Dec.2007.eBook-BBL
- Hacking Wireless Networks for DUMMIES
- Building Cisco Remote Access Networks
- Cisco picks up Pari Networks
- Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
- Cisco Self-Study: Implementing Cisco IPv6 Networks (IPV6)
- 推荐图书 中文名: 黑客大曝光:无线网络安全(Hacking Exposed Wireless,J Cache,J Wright, V Liu)
- hacking
- Pro VB 2005 and the .NET 2.0 Platform, Second Edition
- Rails Plugins (Digital Short Cut): Extending Rails Beyond the Core
- 75道逻辑题答案
- C# + 微软企业库(Microsoft.Enterprise.Library),实现Oracle字段自增的应用
- Pro PHP-GTK (Pro)
- Hacking Exposed Cisco Networks
- 关于常见排序算法的稳定性分析和结论
- ASP.NET实现页面间值传递的几种方法
- The Security Development Lifecycle
- Cryptography for Dummies
- Practical Insight into Cmmi
- The Beginner's Guide to Broadband and Wireless Internet
- Mcft Windows Small Business Server 2003 R2 Administrator's Companion
- Mcft SQL Server(TM) 2005: Applied Techniques Step by Step