Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions

Купить бумажную книгу и читать

Купить бумажную книгу

По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".

Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.

Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.

Название:Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions

Издательство: The McGraw-Hill Companies

Автор:

Год: 2006

Количество страниц: 400

Язык:English

Формат: CHM

Размер:9,8 Mb

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks

Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning

Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels

Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities

Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers

Find out how IOS exploits are written and if a Cisco router can be used as an attack platform

Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR

Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access

Дата создания страницы: