Client-Side Attacks and Defense Client-Side Attacks and Defense

Client-Side Attacks and Defense

    • $49.99
    • $49.99

Publisher Description

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.

- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors

- Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit—the client-side attack

- Defend your network against attacks that target your company's most vulnerable asset—the end user

GENRE
Computers & Internet
RELEASED
2012
September 28
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
Syngress
SELLER
Elsevier Ltd.
SIZE
9.4
MB
How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer or Network How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer or Network
2010
InfoSecurity 2008 Threat Analysis InfoSecurity 2008 Threat Analysis
2011
An Ethical Guide to Cyber Anonymity An Ethical Guide to Cyber Anonymity
2022
Practical Internet Security Practical Internet Security
2007
Protect Your Personal Information Protect Your Personal Information
2016
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide Certified Ethical Hacker (CEH) v11 312-50 Exam Guide
2022
Cryptography InfoSec Pro Guide Cryptography InfoSec Pro Guide
2013
Hands-On Penetration Testing with Kali NetHunter Hands-On Penetration Testing with Kali NetHunter
2019
Kali Linux Wireless Penetration Testing Cookbook Kali Linux Wireless Penetration Testing Cookbook
2017