|
|
libcats.org
Combating Spyware in the EnterprisePiccard P., Faircloth J.Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. System administrators and security professionals responsible for administering and securing networks ranging in size from SOHO networks up the largest, enterprise networks will learn to use a combination of free and commercial anti-spyware software, firewalls, intrusion detection systems, intrusion prevention systems, and host integrity monitoring applications to prevent the installation of spyware, and to limit the damage caused by spyware that does in fact infiltrate their network. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
Герцог и колдуньяАвтор: Афанасьев Иван Борисович, Автор: Жданов СергейКатегория: Научная Фантастика
Размер книги: 942 Kb
Тесты по тактике для высококвалифицированных шахматистовАвтор: Конотоп В.А., Автор: Конотоп С.В.
Размер книги: 3.18 Mb
История Великой отечественной войны Советского Союза 1941-1949Автор: Поспелов П.Н. и др.Категория: !ВОЕННЫЕ ДОКУМЕТЫ
Размер книги: 6.49 Mb
America's Top 101 Jobs For College Graduates: Detailed Information On Major Jobs For People With Four-year And Higher DegreesАвтор: J. Michael Farr
Размер книги: 7.05 Mb
A History of the Popes 1830-1914 (Oxford History of the Christian Church)Автор: Owen ChadwickКатегория: История
Размер книги: 8.08 Mb
The Ascendancy of the Scientific Dictatorship: An Examination of Epistemic Autocracy, from the 19th to the 21st CenturyАвтор: Phillip Darrell Collins, Автор: Paul David Collins
Размер книги: 77.12 Mb
IBM Sametime 8.5.2 Administration GuideАвтор: Gabriella Davis, Автор: Marie L. Scott, Автор: Thomas Duff
Размер книги: 10.78 Mb
|
|
|