Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard CRC Press, 2016 M04 19 - 342 pages The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish |
Contents
1 | |
Chapter 2 Attacker Techniques and Motivations | 75 |
Chapter 3 Exploitation | 119 |
Chapter 4 Malicious Code | 195 |
Chapter 5 Defense and Analysis Techniques | 267 |
Other editions - View all
Common terms and phrases
activity additional administrators advertising allow analysis antivirus application attacker attempts authentication authors block botnet bots changes ciphertext common complete connection contain create detect determine developers devices domain e-mail effective encryption engineering example execute Exhibit exploit firewall format function hide honeypot host iDefense identify infected initial install instructions Internet IP address known limited load malicious code memory method modify monitor multiple obfuscation objects operating system original overflow packet password perform prevent privilege protect protocol proxy query records Report requests requires result rootkit server shellcode shows specific stack string techniques thread tion token traffic victim virtual virtual machine virus vulnerabilities Windows worm