Book description
Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
- Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit—the client-side attack
- Defend your network against attacks that target your company's most vulnerable asset—the end user
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication and Thanks
- Biography
- Chapter 1. Client-Side Attacks Defined
- Chapter 2. Dissection of a Client-Side Attack
- Chapter 3. Protecting Web Browsers
- Chapter 4. Security Issues with Web Browsers
- Chapter 5. Advanced Web Attacks
- Chapter 6. Advanced Web Browser Defenses
- Chapter 7. Messaging Attacks and Defense
- Chapter 8. Web Application Attacks
- Chapter 9. Mobile Attacks
- Chapter 10. Securing Against Client-Side Attack
- Index
Product information
- Title: Client-Side Attacks and Defense
- Author(s):
- Release date: September 2012
- Publisher(s): Syngress
- ISBN: 9781597495912
You might also like
book
Mobile 3D Graphics SoC: From Algorithm to Chip
The first book to explain the principals behind mobile 3D hardware implementation, helping readers understand advanced …
book
Access Control, Authentication, and Public Key Infrastructure
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control …
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …
book
Federated Identity Primer
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically …