eBooks-it.org Logo
eBooks-IT.org Inner Image

Zero-Day Exploit

Countdown to Darkness

Zero-Day Exploit Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Rob Shein
Edition:1
ISBN-10:1931836094
ISBN-13:9781931836098
Pages:412
Published:Aug 04 2004
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.75 MB

Book Description:

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community.* This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists.* Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Download Link:

Related Books:

31 Days Before Your CCNA Exam

A day-by-day review guide for the CCNA 640-802 exam
31 Days Before Your CCNA Exam Image
2nd Edition
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources. The book breaks down key exam topics into 31 daily review sessions using short summaries, lists, tables, examples, and graphics. A Study Resources section provides you with a quick reference for locating more in-depth treatment of a day's topics within the relevant Foundational and Supplemental resources. Use this day-by-day guide to organize, prepare, and review all the CCNA objectives. The features of ...

Zero Configuration Networking

The Definitive Guide
Zero Configuration Networking Image
It used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. Zero Configuration Networking: The Definitive Guide walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implemen...

Buffer Overflow Attacks

Detect, Exploit, Prevent
Buffer Overflow Attacks Image
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflo...



2007 - 2021 © eBooks-IT.org