Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
Chapter 1: Internet Infrastructure for Security Professionals
- Table 1-1: Risks and Benefits of Outsourcing Internet Services to an ISP
- Table 1-2: Risks and Benefits of Self-Managing Internet Services
Chapter 2: ISP Security PracticesSeparating Fact from Fiction
- Table 2-1: ISP Security Assumptions vs. Reality
Chapter 4: Reliable Connectivity
- Table 4-1: Network Components and Conditions Leading to Unreliable Connectivity
- Table 4-2: Potentially Dangerous "Default" Services on Routers/Switches
- Table 4-3: Open Source Configuration Management and Network Management Tools
Chapter 6: Redefining the DMZSecuring Critical Systems
- Table 6-1: Potential Weaknesses in DMZ Design and Methods of Exploitation
- Table 6-2: Checklist for Developing Defenses in a Traditional DMZ Security Zone
- Table 6-3: Risks and Benefits of a Traditional DMZ Design
- Table 6-4: Risks and Benefits of a Modern DMZ Design
Chapter 11: Securing Wireless Networks
- Table 11-1: 802.11 — Standards Information
- Table 11-2: Pros and Cons of Bluetooth
Chapter 13: A Winning Methodology for Vulnerability Assessments
- Table 13-1: Vulnerability Assessment Methodology Standards
Chapter 15: Performing the Assessment, Part II
- Table 15-1: ICMP Type Listing
- Table 15-2: Examples of Input Information for Conducting Data Model Calculations
- Table 15-3: Examples of Output Information for Conducting Data Model Calculations