Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal ZalewskiSilence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

byMichal Zalewski

Paperback | April 25, 2005

Pricing and Purchase Info

$50.65 online 
$51.95 list price
Earn 253 plum® points

Prices and offers may vary in store

Out of stock online

Not available in stores

about

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wiredissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.

Michal Zalewskiis an internationally recognized information security expert with a long track record of delivering cutting-edge research. He is credited with discovering hundreds of notable security vulnerabilities and frequently appears on lists of the most influential security experts. He is the author ofSilence on the Wire(No Starch...
Loading
Title:Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect AttacksFormat:PaperbackDimensions:312 pages, 9 × 7 × 0.85 inPublished:April 25, 2005Publisher:No Starch PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1593270461

ISBN - 13:9781593270469

Reviews

Table of Contents

  • Dedication
  • Foreword
  • Introduction
  • The Source
    • Chapter 1: I Can Hear You Typing
    • Chapter 2: Extra Efforts Never Go Unnoticed
    • Chapter 3: Ten Heads of the Hydra
    • Chapter 4: Working for the Common Good
  • Safe Harbor
    • Chapter 5: Blinkenlights
    • Chapter 6: Echoes of the Past
    • Chapter 7: Secure in Switched Networks
    • Chapter 8: Us versus Them
  • Out in the Wild
    • Chapter 9: Foreign Accent
    • Chapter 10: Advanced Sheep-Counting Strategies
    • Chapter 11: In Recognition of Anomalies
    • Chapter 12: Stack Data Leaks
    • Chapter 13: Smoke and Mirrors
    • Chapter 14: Client Identification: Papers, Please!
    • Chapter 15: The Benefits of Being a Victim
  • The Big Picture
    • Chapter 16: Parasitic Computing, or How Pennies Add Up
    • Chapter 17: Topology of the Network
    • Chapter 18: Watching the Void
  • Closing Words
  • Bibliographic Notes
  • Updates