Ubicación Física: 005.8 / D812 2017
Computer & internet security : a hands on approach / | |
Autor: | Du, Wenliang. |
Pié de imprenta: | London : Wenliang Du, 2019. |
Edición: | Second edition. |
Descripción: | 657 páginas ; ilustraciones ; 19 x 23 cm. |
ISBN: | 9781733003933. |
Tema(s): | |
Contenido: | I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain. |
Resumen: | Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente). |
Lista(s) en las que aparece este ítem: Adquisiciones Ingeniería de Sistemas 2017-
Tipo de ítem | Biblioteca actual | Colección | Signatura topográfica | Copia número | Estado | Fecha de vencimiento | Código de barras | |
---|---|---|---|---|---|---|---|---|
Libro - General | Sede Cra 13 CYP | Colección General | 005.8/D812/2019 (Navegar estantería(Abre debajo)) | Ej. 1 | En Sótano - Bodega (Acceso restringido) | 65665 |
I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain.
Sistemas
Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente).
No hay comentarios en este titulo.