Занятные книжки / публикации

Dec 01, 2019 18:30



  1. Aggressive Network Self-Defense
    Edited by: Neil Archibald, dedhed, Seth Fogie, Chris Hurley, Dan Kaminsky, Johnny Long, Luke McOmie (aka Pyr0), Haroon Meer, Bruce Potter, Roelof Temmingh, Neil R. Wyler (aka Grifter) and Timothy M. Mullen (THOR). ISBN: 978-1-931836-20-3.
    Copyright © 2005 Elsevier Inc. All rights reserved
    Content:
    Part I: Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge
    Chapter 1 - PDA Perils: Revenge from the Palm of Your Hand, Pages 1-55, Seth Fogie
    Chapter 2 - The Case of a WLAN Attacker: In the Booth, Pages 57-84, Chris Hurley
    Chapter 3 - MD5: Exploiting the Generous, Pages 85-101, Dan Kaminsky
    Chapter 4 - A VPN Victim's Story: Jack's Smirking Revenge, Pages 103-145, Johnny Long and Neil Archibald.
    Chapter 5 - Network Protection: Cyber-Attacks Meet Physical Response, Pages 147-177, Bruce Potter
    Chapter 6 - Network Insecurity: Taking Patch Management to the Masses, Pages 179-212, Neil R. Wyler (aka Grifter)
    Chapter 7 - The Fight for the Primulus Network: Yaseen vs Nathan, Pages 213-252, Harron Meer and Roelof Temmingh
    Chapter 8 - Undermining the Network: A Breach of Trust, Pages 253-283, Luke McOmie (aka Pyr0) and dedhed (Nathan) (Marigoni)
    Part II: The Technologies and Concepts Behind Network Strike Back
    Chapter 9 - ADAM: Active Defense Algorithm and Model, Pages 287-311
    Chapter 10 - Defending Your Right to Defend, Pages 313-321, Timothy M. Mullen
    Chapter 11 - MD5 to Be Considered Harmful Someday, Pages 323-337, Dan Kaminsky
    Chapter 12 - When the Tables Turn: Passive Strike-Back, Pages 339-371, Haroon Meer, Roelof Temmingh and Charl van der Walt
  2. Asterisk Hacking. Toolkit and Live Cd.
    Copyright © 2007 Elsevier Inc. All rights reserved
    Authors: Benjamin Jackson, Champ Clark III, Larry Chaffin and Johnny Long
    ISBN: 978-1-59749-151-8
    Content:
    Co-Authors, Page v
    Technical Editors, Page vi
    Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
    Chapter 2 - Setting Up Asterisk, Pages 21-64
    Chapter 3 - Configuring Asterisk, Pages 65-114
    Chapter 4 - Writing Applications with Asterisk, Pages 115-145
    Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
    Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
    Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
    Index, Pages 245-253
  3. Black Hat Physical Device Security
    Exploiting Hardware and Software
    Copyright © 2004 Elsevier Inc. All rights reserved
    Author: Drew Miller. ISBN: 978-1-932266-81-8
    Content:
    Acknowledgments, Page v
    Author, Page vii
    Technical Editor, Page viii
    Foreword, Pages xvii-xix
    Introduction, Pages xxi-lii
    Chapter 1 - The Enveloping Paradigm, Pages 1-27
    Chapter 2 - Inheriting security problems, Pages 29-56
    Chapter 3 - Information security, Pages 57-125
    Chapter 4 - Mitigating Exposures, Pages 127-169
    Chapter 5 - Monitoring Software Exposures, Pages 171-209
    Chapter 6 - Taking a Hard Look at Hardware, Pages 211-236
    Chapter 7 - Authenticating People, Pages 237-273
    Chapter 8 - Monitoring and Detecting Deviations, Pages 275-295
    Chapter 9 - Notifying Systems, Pages 297-304
    Appendix A - Terms in Context, Pages 305-309
    Appendix B - Factoring by Quadratic Relationships, Pages 311-324
    Appendix C - Factoring Source Code for Fun, Pages 325-351
    Index, Pages 353-363
  4. Botnets
    The Killer Web App
    Copyright © 2007 Elsevier Inc. All rights reserved
    Authors: Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems and Michael Cross. ISBN: 978-1-59749-135-8
    Content:
    Acknowledgments, Page v
    Lead Authors and Technical Editors, Page vi
    Contributors, Pages vi-viii
    Chapter 1 - Botnets: A Call to Action, Pages 1-27
    Chapter 2 - Botnets Overview, Pages 29-75
    Chapter 3 - Alternative Botnet C&Cs, Pages 77-95
    Chapter 4 - Common Botnets, Pages 97-132
    Chapter 5 - Botnet Detection: Tools and Techniques, Pages 133-215
    Chapter 6 - Ourmon: Overview and Installation, Pages 217-243
    Chapter 7 - Ourmon: Anomaly Detection Tools, Pages 245-283
    Chapter 8 - IRC and Botnets, Pages 285-312
    Chapter 9 - Advanced Ourmon Techniques, Pages 313-343
    Chapter 10 - Using Sandbox Tools for Botnets, Pages 345-390
    Chapter 11 - Intelligence Resources, Pages 391-415
    Chapter 12 - Responding to Botnets, Pages 417-452
    Appendix A - FSTC Phishing Solutions Categories, Pages 453-458
    Index, Pages 459-464
  5. Buffer Overflow Attacks. Detect, Exploit, Prevent
    Copyright © 2005 Elsevier Inc. All rights reserved
    Authors: James C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen and Dave Aitel. ISBN: 978-1-932266-67-2
    Acknowledgments, Page v
    Lead Author, Page vii
    Contributing Authors, Page viii
    Additional Area Experts, Page ix
    Author's Acknowledgements, Page x
    Foreword, Pages xxi-xxii
    Part 1: Expanding on Buffer Overflows
    Part II: Exploiting Buffer Overflows
    Part III: Finding Buffer Overflows
    Appendix A - The Complete Data Conversion Table, Pages 477-484
    Appendix B - Useful Syscalls, Pages 485-487
    Index, Pages 489-497
  6. Вы, конечно, шутите, мистер Фейнман! (Surely You're Joking, Mr. Feynman!)
    Ричард Ф.Фейнман. Перевод с английского Н. А. Зубченко, О. Л. Тиходеевой, М. Шифмана
    ISBN 5-93972-087-0

Список интересной литературы

Previous post Next post
Up