Imagen de cubierta local
Imagen de cubierta local
Tipo: materialTypeLabelLibro - General
Ubicación Física: 005.8 / D812 2017

Computer & internet security : a hands on approach /

Autor: Du, Wenliang.
Pié de imprenta: London : Wenliang Du, 2019.
Edición: Second edition.
Descripción: 657 páginas ; ilustraciones ; 19 x 23 cm.
ISBN: 9781733003933.
Tema(s):
Contenido: I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain.
Resumen: Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente).

Lista(s) en las que aparece este ítem: Adquisiciones Ingeniería de Sistemas 2017-
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libro - General Libro - General Sede Cra 13 CYP Colección General 005.8/D812/2019 (Navegar estantería(Abre debajo)) Ej. 1 En Sótano - Bodega (Acceso restringido) 65665

I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain.

Sistemas

Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente).

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

Imagen de cubierta local

Universidad Católica de Colombia • PBX: (57 1) 3 27 73 00 - (57 1) 3 27 73 33
Bogotá, Avenida Caracas # 46 -72, sede Las Torres • Bogotá, Carrera 13 # 47 – 30, Sede 4​ • Bogotá, Diagonal 46 A # 15 B – 10, sede El Claustro
Bogotá, Carrera 13 # 47 – 49, sede Carrera 13