xviii, 250p., Tables, B/W Illus., App., 24 cm. (First pub. in 2004)
CONTENTS
CONTENTS:- I. Email Security. II. Instant Messengers. III. Intellectual Property Thefts. IV. Password Cracking Attacks. V. Identity Attacks. VI. Input Validation Attacks. VII. Denial of Services (DOS) Attacks. VIII. Buffer Overflows. IX. Social Engineering Attacks.
DESCRIPTION
The Internet with its widening global dimensions has exposed the corporate world to the grave threat of espionage and cyber crimes; however, the organizations are invariably oblivious to these threats. The Ethical Hacking Guide to Corporate Security dismisses this incompetent approach. The book has addressed some of the horrific cyber crime cases to hit the corporate world, across 17 different countries in 5 continents. Direct correlation has been drawn between computer security and business profitability through an appropriate mix of technical explanation and business implication. This is a thoroughly researched book that provides easy-to-understand analyses of some of the most dangerous security threats and measures to safeguard networks.