September 2007
Intermediate to advanced
360 pages
9h 30m
English
Part I Vulnerabilities and Mitigation Techniques
Chapter 1 Introduction to Security
Chapter 2 Defeating a Learning Bridge’s Forwarding Process
Chapter 3 Attacking the Spanning Tree Protocol
Chapter 5 Leveraging DHCP Weaknesses
Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement
Chapter 8 What About Power over Ethernet?
Chapter 10 Can We Bring VRRP Down?
Chapter 11 Information Leaks with Cisco Ancillary Protocols
Part II How Can a Switch Sustain a Denial of Service Attack?
Chapter 12 Introduction to Denial of Service Attacks
Chapter 13 Control Plane Policing
Read now
Unlock full access