Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Attack and Defend Computer Security Set (eBook)

eBook Download: PDF
2014 | 1. Auflage
1656 Seiten
John Wiley & Sons (Verlag)
978-1-118-90677-4 (ISBN)

Lese- und Medienproben

Attack and Defend Computer Security Set - Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, Ozh Richard
Systemvoraussetzungen
57,99 inkl. MwSt
(CHF 56,65)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Defend your networks and data from attack with this unique
two-book security set

The Attack and Defend Computer Security Set is a two-book
set comprised of the bestselling second edition of Web
Application Hacker's Handbook and Malware
Analyst's Cookbook. This special security bundle combines
coverage of the two most crucial tactics used to defend networks,
applications, and data from attack while giving security
professionals insight into the underlying details of these attacks
themselves.

The Web Application Hacker's Handbook takes a broad look
at web application security and exposes the steps a hacker can take
to attack an application, while providing information on how the
application can defend itself. Fully updated for the latest
security trends and threats, this guide covers remoting frameworks,
HTML5, and cross-domain integration techniques along with
clickjacking, framebusting, HTTP parameter pollution, XML external
entity injection, hybrid file attacks, and more.

The Malware Analyst's Cookbook includes a book and DVD
and is designed to enhance the analytical capabilities of anyone
who works with malware. Whether you're tracking a Trojan
across networks, performing an in-depth binary analysis, or
inspecting a machine for potential infections, the recipes in this
book will help you go beyond the basic tools for tackling security
challenges to cover how to extend your favorite tools or build your
own from scratch using C, Python, and Perl source code. The
companion DVD features all the files needed to work through the
recipes in the book and to complete reverse-engineering challenges
along the way.

The Attack and Defend Computer Security Set gives your
organization the security tools needed to sound the alarm and stand
your ground against malicious threats lurking online.

Dafydd Stuttard has more than 10 years' experience in the area of web application security. He is the lead author of Web Application Hacker's Handbook 1e and 2e, has performed penetration testing training around the world. Marcus Pinto is co-author of Web Application Hacker's Handbook 1e and 2e and has over 10 years' experience within web application security. He has delivered a variety of training courses to technical audiences and speaks at security events around and outside of the UK. Michael Hale Ligh is the lead author of The Malware Analyst's Cookbook and Director of Malware Research of the The Volatility Project. Michael is a regular presenter at DefCon conferences. Matt Richard is and is the Malicious Code Operations Lead at Raytheon Corporation and has written a number of testing tools. Steven Adair is a security researcher with The Shadowserver Foundation and co-author of The Malware Analyst's Cookbook and deals with cyber attacks of all kinds esp. those linked to cyber espionage. Blake Hartstein conducts incident response and intrusion detection for Bloomberg and previously for VeriSign. The biggest and best companies worldwide depend on him for intelligence about attacks affecting their organization.

WEB APPLICATION HACKER'S HANDBOOK 2E

Chapter 1: Web Application (In)security 1

Chapter 2: Core Defense Mechanisms 17

Chapter 3: Web Application Technologies 39

Chapter 4: Mapping the Application 73

Chapter 5: Bypassing Client-Side Controls 117

Chapter 6: Attacking Authentication 159

Chapter 7: Attacking Session Management 205

Chapter 8: Attacking Access Controls 257

Chapter 9: Attacking Data Stores 287

Chapter 10: Attacking Back-End Components 357

Chapter 11: Attacking Application Logic 405

Chapter 12: Attacking Users: Cross-Site Scripting 431

Chapter 13: Attacking Users: Other Techniques 501

Chapter 14: Automating Customized Attacks 571

Chapter 15: Exploiting Information Disclosure 615

Chapter 16: Attacking Native Compiled Applications 633

Chapter 17: Attacking Application Architecture 647

Chapter 18: Attacking the Application Server 669

Chapter 19: Finding Vulnerabilities in Source Code 701

Chapter 20: A Web Application Hacker's Toolkit 747

Chapter 21: A Web Application Hacker's Methodology 791

MALWARE ANALYST'S COOKBOOK AND DVD

Chapter 1: Anonymizing Your Activities 1

Chapter 2: Honeypots 27

Chapter 3: Malware Classifi cation 51

Chapter 4: Sandboxes and Multi-AV Scanners 89

Chapter 5: Researching Domains and IP Addresses 119

Chapter 6: Documents, Shellcode, and URLs 155

Chapter 7: Malware Labs 211

Chapter 8: Automation 239

Chapter 9: Dynamic Analysis 283

Chapter 10: Malware Forensics 337

Chapter 11: Debugging Malware 395

Chapter 12: De-Obfuscation 441

Chapter 13: Working with DLLs 487

Chapter 14: Kernel Debugging 511

Chapter 15: Memory Forensics with Volatility 571

Chapter 16: Memory Forensics: Code Injection and Extraction 601

Chapter 17: Memory Forensics: Rootkits 637

Chapter 18: Memory Forensics: Network and Registry 673

Erscheint lt. Verlag 4.3.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Computer Science • Informatik • Networking / Security • Netzwerke / Sicherheit
ISBN-10 1-118-90677-2 / 1118906772
ISBN-13 978-1-118-90677-4 / 9781118906774
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technische und organisatorische Schutzmaßnahmen gegen Datenverlust …

von Thomas H. Lenhard

eBook Download (2025)
Springer Vieweg (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 45,90
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 38,95