Description |
1 online resource (225 p.) |
Contents |
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Biography -- Abbreviations and Acronyms -- Chapter 1 Introduction -- Chapter 2 Web and network basics -- Networks -- Application layer -- Presentation layer -- Session layer -- Transport layer -- Network layer -- Data link layer -- Physical layer -- How the OSI model works -- TCP/IP model -- Application layer -- Transport layer -- Internet layer -- Link layer -- Protocols and ports -- UDP and TCP -- Web specifics -- HTTP -- HTTP resources -- HTTP connections -- Conversations with a server -- UPnP |
|
Remote access protocols -- SSH -- Suggested projects and experiments -- Deploy Apache -- Deploy a Droplet or virtual server -- References -- Chapter 3 Cryptography -- Why we need cryptography -- Classical cryptography -- Substitution ciphers -- Frequency analysis -- Caesar cipher -- Vigenere cipher -- The one-time pad -- Modern algorithms -- Practical encryption engineering -- Encryption in Node.js -- Hashes -- Python cryptography -- Steganography -- Terminology and basics -- Images -- Audio encryption -- Least significant bit (LSB) coding -- Phase encoding -- Spread spectrum -- Parity encoding |
|
Echo hiding -- DeepSound -- Using stenography practically -- Digital watermarking -- Suggested projects -- Chapter 4 Hacking overview -- Case histories -- a context and background of hacks and hacker's motivations -- Worms -- Viruses -- Deception -- File replication -- Trojan -- Botnets -- DDoS -- Motivations behind malware -- History -- Case history: Stuxnet -- Case history: Michael Calce (Aka MafiaBoy) -- Case history: Jonathan James -- Case history: Gary McKinnon -- Case history: Lauri Love -- Huawei -- Techniques -- Spoofing email -- the basis of phishing attack -- Bots and automated mechanisms |
|
Protocols -- Tests -- Resistance to social engineering -- Waste handling -- General advice -- Software protection -- Intelligence and research used for social engineering -- Sources -- Search engines -- Google Alerts -- Google/Bing images -- Using web archives -- Social media -- Specialized search engines -- Media -- documents, photographs, video -- Telephone numbers and addresses -- Online tracing with IP addresses and presence -- Conclusions -- References -- Chapter 7 Cyber countermeasures -- Introduction -- Training -- Firewalls -- Linux -- Cloud -- Shields -- Malware detection -- Websites |
Notes |
Description based upon print version of record |
Bibliography |
References -- Chapter 5 Packet analysis and penetration testing -- Packet sniffing -- Wireshark -- Modifying Wireshark -- Analysis with Wireshark -- Analyzing malware - Trickbot -- Conclusion -- Suggested projects -- Chapter 6 Social engineering -- Phishing -- Spear phishing -- Vishing -- Smishing -- Pretexting -- Water holing -- Baiting -- Quid Pro Quo -- Tailgating -- Scareware -- Other varieties -- Social engineering process -- Research -- Engagement -- The attack -- The conclusion -- Social engineering countermeasures -- Training -- Frameworks and protocols -- Categorizing information |
Notes |
Antivirus |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Cyberspace -- Security measures.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Cyberspace -- Security measures
|
Form |
Electronic book
|
ISBN |
9781000514575 |
|
1000514579 |
|