Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Thumbnail 1

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

4.3/5
产品编号: 21299035
安全交易
经常一起购买

描述

Full description not available

评论

4.3

全部来自已验证的购买

A**L

Good, but scenarios getting out of date

The Challenge/Solution style of these books are great for security beginners as well as seasoned professionals. If you read carefully you can pick up many hints/tools which you can use in real life security scenarios.My only -ve comment about this book is its getting out of date now. Many of the incidents described are not relevant now, as security practices at most firms would thrawt these incidents. Having said that, the scenarios are still good for security beginners. For advanced readers I would suggest the Second edition or the soon to be released third edition.

A**A

Challenging and a great read

First edition and informative, while leading you to the why, where and how. Different and introductory ways of analyzing situations, but like the rest of the series, this book definitely is a must in any security library.

W**O

Read it with admire...

I am a Linux lecturer.And I like to read those books about Hacking and Security.Most of the books are not that easy to read.Because writers assume that their readers must have a strong background on those issues.Sometimes they just throw you the answer without explaination.But this book really makes a difference.It gives you the situation, makes you to think at first.And then you can read the answers at the back, review your original point of view.And every example it provides show us a possible breach in reality.Not those theory-based stories...Wanna secure your system?Just READ IT!! No matter buy it or borrow it...

A**T

I learned from these and they are still the best

Once upon a time I consumed and cherished these books... now I look back on them fondly and still recommend them.Now, I keep buying extra copies of these for other people. Though a few years old they are an excellent resource as is and great for poaching scenarios from as well.

B**R

great

great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.

T**C

great excersizes for log and incident review

The book has 20 hacker scenarios, the writer provides log samples and information regarding each incident, and you need to determine who,when,what and where. Each scenario has answer/solutions section to each incident where the forensic analyst provides their insight into each. I do security as my profession so I’m always looking for more examples of intrusions and how they are analyzed. I will most likely buy the rest in the series, this book was fun.

J**N

An Incredible Opportunity to Srutinize Actual Case Studies!

Along with advances in computer and Internet technologies we have also witnessed countless unlawful attempts to break into computer systems around the world with the intent to steal, damage, or otherwise compromise information.Hacker's Challenge by Mike Schiffman offers readers an incredible opportunity to scrutinize actual case studies of intrusion attempts - those attempts to gain unauthorized entry into computers systems to cause deliberate harm or mischief.Hacker's Challenge is broken up into two sections - 20 actual case studies with actual attack scenarios and log files (names and data have been changed for legal and confidentiality concerns), and corresponding solutions to them. Readers are challenged to read the case studies and determine for themselves how the attacks were made, what vulnerabilities were exploited, what harm, if any, had occurred, how to lesson the impact of future intrusions, and what possible remedies can be made to prevent future attacks altogether.Readers will learn how to determine the levels of attacker technical abilities and sophistication used. The case studies cover a broad range of attacks - those perpetrated by "script kiddies" who use existing attack code made available on the Internet and using publicly known attack methods, clever and skilled attackers who use publicly known coding and write their own code, and extremely skilled attackers who use publicly known coding, who write their own code, and who take advantage of non-public exploits and cutting-edge technologies to accomplish their evil work.Of further interest, the case studies and solutions presented in Hacker's Challenge will demonstrate how company officials and security consultant team members can effectively respond to different kinds of intrusion attempts. Their methods of discovery - much like police detective work, are fascinating, detailed, and very professional. Readers will follow along with them step-by-step to determine the order of events, to search log files and research events for clues, to think through issues for themselves, and arrive at their own conclusions. The solutions at the back of the book provide detailed answers, intrusion prevention measures, and a wealth of additional resources for further consideration.An added benefit of this book is that readers will learn about the skills involved in this kind of detective work, such as knowing about software programs and operating systems, knowing their particular vulnerabilities and exploits, knowing programming languages, reading log files, piecing together details, searching computer systems, searching buildings, interviewing suspects and witnesses, consulting with computer security experts, and putting to use essential people skills to obtain helpful information.Hacker's Challenge also presents readers with some valuable lessons to be learned - by learning from the mistakes of others. The case studies point out a number of system weaknesses that can be easily exploited to gain access to computer systems - including the keeping of system software default settings, using dictionary word passwords, failing to install the latest program versions, failing to install updates and security patches in a timely manner, failing to use anti-virus and intrusion detection programs, failing to use an appropriate firewall, failing to filter ports, failing to use appropriate encryption, failing to properly set radio strength - for wireless systems, and failing to either remove or disable unneeded programs and services on Web servers.Hacking poses many problems for a lot of people. Consequences of someone breaking into a computer system can affect the lives of many people - embarrassing downtime, lost revenue, stock market reactions, unemployment, public health and safety. Vigilance is key here - keeping up on the latest vulnerabilities and exploits, using the latest software versions and patches, and incorporating other necessary security precautions. This book will greatly benefit any company or person involved in handling information technology issues. It's also ideally suited for classroom and workshop use!

M**N

Real life scenarios

As a network security major, I have a lot of information just floating around in my head. This book has helped me by bringing it all together. I can't wait for the other two books in the series to arrive!

A**K

Five Stars

i personally love this book

G**S

Five Stars

ok

F**E

Ein Buch, das sehr aufschlussreich ist

Mich hat zunächst der Titel angesprochen. Nach dem Lesen (englisch) erhält man ein deutlich breiteres Verständnis zu Intrusion in Netze. Nicht nur das Ausnutzen von Exploits auch einfache Fehlkonfigurationen und deren Folgen werden aufgezeigt. Ich überlege, mir die anderen Bände auch zu kaufen.

常见问题

TrustPilot

TrustScore 4.5 | 7,300多个评论

Sneha T.

我收到的产品完好无损。总体来说服务很棒。

1 个月前

Reema J.

寻找稀缺商品的完美平台。送货及时。

1 个月前

全球购物,通过 Desertcart 享受优惠
物有所值
各种产品的价格具有竞争力
全球购物
为 100 多个国家的数百万购物者提供服务
增强保护
深受全球购物者喜爱的值得信赖的支付方式
客户保证
深受全球购物者喜爱的值得信赖的支付方式。
沙漠车应用程序
随时随地随时随地购物。
HK$344

关税和税费包括

Hong Kong店铺
1
免运费

with PRO Membership

免费退货

30天对于 PRO 会员用户

15天无会员资格

安全交易

TrustPilot

TrustScore 4.5 | 7,300多个评论

苏雷什· K.

质量和快速送货让我印象深刻。会再次来这里购物。

4天前

阿里·H.

发货快,包装精良。Leatherman 工具手感非常高档和坚固。

1天前

Hackers Challenge Test Your Incident Response Skills Using 20 Scenarios | Desertcart Hong Kong