Vulnerability Analysis and Defense for the Internet

By Abhishek Singh , B. Singh , H. Joseph

Vulnerability Analysis and Defense for the Internet Cover Image

Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.

Full Description

  • ISBN13: 978-0-3877-4389-9
  • 272 Pages
  • User Level: Science
  • Publication Date: January 24, 2008
  • Available eBook Formats: PDF
  • eBook Price: $119.00
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and psuedo code, which enable a user to identify if an application/protocol is vulnerable. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume also includes case studies where latest exploits are discussed.
Table of Contents

Table of Contents

  1. Wireless Security.
  2. Introduction.
  3. Vulnerability Analysis for Mail Protocols.
  4. Vulnerability Analysis for FTP and TFTP.
  5. Vulnerability Analysis for HTTP.
  6. Vulnerability Analysis for DNS and DHCP.
  7. Vulnerability Analysis for LDAP and SNMP.
  8. Vulnerability Analysis for RPC.
  9. Malware.
  10. Reverse Engineering.
  11. Index.
Errata

Please Login to submit errata.

No errata are currently published