Client-side attacks and defense:
Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hid...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Waltham, MA]
Syngress
2012
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attackDefend your network against attacks that target your company's most vulnerable asset-the end user |
Beschreibung: | Includes index. - Title from publisher data Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9781597495912 1597495913 1283634694 9781283634694 1597495905 9781597495905 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125905 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597495912 |9 978-1-59749-591-2 | ||
020 | |a 1597495913 |9 1-59749-591-3 | ||
020 | |a 1283634694 |9 1-283-63469-4 | ||
020 | |a 9781283634694 |9 978-1-283-63469-4 | ||
020 | |a 1597495905 |9 1-59749-590-5 | ||
020 | |a 9781597495905 |9 978-1-59749-590-5 | ||
035 | |a (ZDB-33-ESD)ocn812529127 | ||
035 | |a (OCoLC)812529127 | ||
035 | |a (DE-599)BVBBV046125905 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean-Philip |e Verfasser |4 aut | |
245 | 1 | 0 | |a Client-side attacks and defense |c Sean-Philip Oriyano, Robert Shimonski |
264 | 1 | |a [Waltham, MA] |b Syngress |c 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - Title from publisher data | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attackDefend your network against attacks that target your company's most vulnerable asset-the end user | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Shimonski, Robert |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597495905 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 6613947148 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597495905 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9786613947147 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495905 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506358 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495905 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445467770881 |
---|---|
any_adam_object | |
author | Oriyano, Sean-Philip |
author_facet | Oriyano, Sean-Philip |
author_role | aut |
author_sort | Oriyano, Sean-Philip |
author_variant | s p o spo |
building | Verbundindex |
bvnumber | BV046125905 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn812529127 (OCoLC)812529127 (DE-599)BVBBV046125905 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03364nmm a2200541zc 4500</leader><controlfield tag="001">BV046125905</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495912</subfield><subfield code="9">978-1-59749-591-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495913</subfield><subfield code="9">1-59749-591-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283634694</subfield><subfield code="9">1-283-63469-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283634694</subfield><subfield code="9">978-1-283-63469-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495905</subfield><subfield code="9">1-59749-590-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495905</subfield><subfield code="9">978-1-59749-590-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn812529127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812529127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125905</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Client-side attacks and defense</subfield><subfield code="c">Sean-Philip Oriyano, Robert Shimonski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Waltham, MA]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Title from publisher data</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attackDefend your network against attacks that target your company's most vulnerable asset-the end user</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shimonski, Robert</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597495905</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">6613947148</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597495905</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9786613947147</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495905</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506358</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495905</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125905 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495912 1597495913 1283634694 9781283634694 1597495905 9781597495905 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506358 |
oclc_num | 812529127 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Oriyano, Sean-Philip Verfasser aut Client-side attacks and defense Sean-Philip Oriyano, Robert Shimonski [Waltham, MA] Syngress 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index. - Title from publisher data Includes bibliographical references and index Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attackDefend your network against attacks that target your company's most vulnerable asset-the end user COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer networks Access control Computer networks Security measures Shimonski, Robert Sonstige oth Erscheint auch als Druck-Ausgabe 1597495905 Erscheint auch als Druck-Ausgabe 6613947148 Erscheint auch als Druck-Ausgabe 9781597495905 Erscheint auch als Druck-Ausgabe 9786613947147 http://www.sciencedirect.com/science/book/9781597495905 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Oriyano, Sean-Philip Client-side attacks and defense COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer networks Access control Computer networks Security measures |
title | Client-side attacks and defense |
title_auth | Client-side attacks and defense |
title_exact_search | Client-side attacks and defense |
title_full | Client-side attacks and defense Sean-Philip Oriyano, Robert Shimonski |
title_fullStr | Client-side attacks and defense Sean-Philip Oriyano, Robert Shimonski |
title_full_unstemmed | Client-side attacks and defense Sean-Philip Oriyano, Robert Shimonski |
title_short | Client-side attacks and defense |
title_sort | client side attacks and defense |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer networks Access control Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Access control Computer networks / Security measures Computer networks Access control Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597495905 |
work_keys_str_mv | AT oriyanoseanphilip clientsideattacksanddefense AT shimonskirobert clientsideattacksanddefense |