About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 220. Chapters: Warchalking, Spyware, Denial-of-service attack, Kerberos, IP address spoofing, Extranet, Virtual private network, Computer security, Password length parameter, Internet Storm Center, Storm botnet, Wireless security, Cisco PIX, Threat, Deep packet inspection, Distributed firewall, Internet censorship, NTLM, Srizbi botnet, IEEE 802.1X, IP fragmentation attacks, Wired Equivalent Privacy, Check Point, TrustPort, OpenVPN, Capture the flag, Digital Postmarks, Security service, Wardriving, Penetration test, Internet security, Wi-Fi Protected Access, Barracuda Networks, Network intelligence, Check Point VPN-1, Wireless LAN security, Port knocking, DNS hijacking, SSL-Explorer: Community Edition, TeamF1, Mobile virtual private network, Digital security, Honeypot, Metasploit Project, Stateful firewall, Unified threat management, Network security, Zero-day attack, SecureWorks, Packet capture, Codenomicon, Entrust, Guided tour puzzle protocol, Data breach, Managed security service, NetBox Blue, Tarpit, Kaspersky Anti-Virus, Network Access Control, Intrusion prevention system, DMZ, Session hijacking, Fortinet, Mariposa botnet, Open proxy, Check Point Abra, Device fingerprint, Captive portal, Zombie computer, CyberCIEGE, ARP spoofing, Aladdin Knowledge Systems, BredoLab botnet, Core Security, NAT traversal, Rustock botnet, Same origin policy, Port forwarding, Virtual private server, Phoning home, TCP reset attack, Anti-phishing software, Security controls, Sybil attack, Stonesoft Corporation, Fail2ban, Attack tree, Protected computer, Application-level gateway, Core Impact, Countermeasure, Trusted Network Connect, SYN cookies, Web application security, Standard Access Control List, Spoofing attack, Asprox botnet, Cisco ASA, OSSEC, Forward-confirmed reverse DNS, Rogue access point, Integrated Windows Authentication, Network...