NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

Cyber security essentials

By: Contributor(s): Publication details: London CRC Press 2011Description: 325p xvISBN:
  • 9780815351429
Subject(s): DDC classification:
  • 343.09945 GRA
Contents:
Table of Contents: Cyber Security Fundamentals Network and Security Concepts Information Assurance Fundamentals Basic Cryptography Symmetric Encryption Public Key Encryption The Domain Name System (DNS) Firewalls Virtualization Radio-Frequency Identification Microsoft Windows Security Principles Windows Tokens Window Messaging Windows Program Execution The Windows Firewall Attacker Techniques and Motivations How Hackers Cover Their Tracks (Anti-forensics) How and Why Attackers Use Proxies Tunneling Techniques Fraud Techniques Phishing, Smishing, Vishing and Mobile Malicious Code Rogue Anti-Virus Click Fraud Threat Infrastructure Botnets Fast-Flux Advanced Fast-Flux Exploitation Techniques to Gain a Foothold Shellcode Integer Overflow Vulnerabilities Stack-Based Buffer Overflows Format-String Vulnerabilities SQL Injection Malicious PDF Files Race Conditions Web Exploit Tools DoS Conditions Brute-Force and Dictionary Attacks Misdirection, Reconnaissance and Disruption Methods Cross-Site Scripting (XSS) Social Engineering WarXing DNS Amplification Attacks Malicious Code Self-Replicating Malicious Code Worms Viruses Evading Detection and Elevating Privileges Obfuscation Virtual Machine Obfuscation Persistent Software Techniques Rootkits Spyware Attacks against Privileged User Accounts and Escalation of Privileges Token Kidnapping Virtual Machine Detection Stealing Information and Exploitation Form Grabbing Man-in-the-Middle Attacks DLL Injection Browser Helper Objects Defense and Analysis Techniques Memory Forensics Why Memory Forensics Is Important Capabilities of Memory Forensics Memory Analysis Frameworks Dumping Physical Memory Installing and Using Volatility Finding Hidden Processes Volatility Analyst Pack Honeypots Malicious Code Naming Automated Malicious Code Analysis Systems Passive Analysis Active Analysis Physical or Virtual Machines Intrusion Detection Systems iDefense Special File Investigation Tools
Star ratings
    Average rating: 0.0 (0 votes)

Table of Contents:
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall

Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux

Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks

Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects

Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems

iDefense Special File Investigation Tools