My Account Details

ISBN10: 0072263040 | ISBN13: 9780072263046

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.
FOREWORDACKNOWLEDGMENTSINTRODUCTIONPart I: ChallengesChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
INTRODUCTIONPart I: ChallengesChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsPart II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Part II: SolutionsChapter 1: To Catch a PhishChapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 2: Owning the PharmChapter 3: Big Bait, Big PhishChapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 4: Shooting Phish in a BarrelChapter 5: Too Few SecretsChapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 6: Upgraded or "Owned?"Chapter 7: Pale Blue GlowChapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 8: Crossing the LineChapter 9: The Root of the ProblemChapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 10: Firewall InsightsChapter 11: Peter LemonJello's "A Series of Unfortunate Events"Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 12: Share and Share AlikeChapter 13: The Holy GrailChapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 14: Open SourceChapter 15: Cup of ChaiChapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 16: Love Plus OneChapter 17: Bullet in the Blue SkyChapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 18: The Insider IIIChapter 19: Jumping Someone Else's TrainChapter 20: The Not-So-Usual SuspectsINDEX
Chapter 20: The Not-So-Usual SuspectsINDEX
Need support? We're here to help - Get real-world support and resources every step of the way.