Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Chapter List

Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: Redefining the DMZSecuring Critical Systems
Chapter 7: Intrusion Detection and Prevention
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Chapter 9: Data LeaksExploiting Egress
Chapter 10: Sinkholes and Backscatter
Chapter 11: Securing Wireless Networks

Категории