Senin, 31 Maret 2014

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Are you really a follower of this Cyber Operations: Building, Defending, And Attacking Modern Computer Networks, By Mike O'Leary If that's so, why don't you take this book now? Be the first person that like and also lead this publication Cyber Operations: Building, Defending, And Attacking Modern Computer Networks, By Mike O'Leary, so you could obtain the reason as well as messages from this publication. Never mind to be confused where to obtain it. As the various other, we discuss the connect to check out as well as download the soft data ebook Cyber Operations: Building, Defending, And Attacking Modern Computer Networks, By Mike O'Leary So, you may not bring the published publication Cyber Operations: Building, Defending, And Attacking Modern Computer Networks, By Mike O'Leary anywhere.

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary



Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Download PDF Ebook Online Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.

Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems.

Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers through privilege escalation to a domain administrator, or attacks against simple network servers through the compromise of a defended e-commerce site.

The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security.

What you’ll learn
  • How to securely set up a complete network, from its infrastructure through web applications
  • How to integrate defensive technologies such as firewalls and intrusion detection systems into your network
  • How to attack your network with tools like Kali Linux, Metasploit, and Burp Suite
  • How to gain situational awareness on your network to detect and prevent such attacks
Who this book is for

This book is for beginning and intermediate professionals in cyber security who want to learn more about building, defending, and attacking computer networks. It is also suitable for use as a textbook and supplementary text for hands-on courses in cyber operations at the undergraduate and graduate level.

Table of Contents

Chapter 1. System Setup

Chapter 2. Basic Offense

Chapter 3. Operational Awareness

Chapter 4. DNS & BIND

Chapter 5. Enumerating the Network

Chapter 6. Active Directory

Chapter 7. Attacking the Domain

Chapter 8. Logging

Chapter 9. Network Services

Chapter 10. Malware

Chapter 11. Apache and ModSecurity

Chapter 12. IIS and ModSecurity

Chapter 13. Web Attacks

Chapter 14. Firewalls

Chapter 15. MySQL

Chapter 16. Snort

Chapter 17. PHP

Chapter 18. Web Applications

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

  • Amazon Sales Rank: #413387 in Books
  • Published on: 2015-10-20
  • Released on: 2015-11-08
  • Original language: English
  • Number of items: 1
  • Dimensions: 10.00" h x 1.74" w x 7.00" l, 2.90 pounds
  • Binding: Paperback
  • 744 pages
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

About the Author Mike O’Leary is a professor at Towson University and the founding Director of the School of Emerging Technologies. He developed and teaches hands-on capstone courses in computer security for both undergraduate and graduate students. He has coached the Towson University Cyber Defense team to the finals of the National Collegiate Cyber Defense Competition in 2010, 2012, and 2014.


Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Where to Download Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Most helpful customer reviews

0 of 0 people found the following review helpful. This is the best cyber security book I own By jfranz This is the best cyber security book I own. The author and technically reviewer have done an excellent job providing a step-by-step approach for setting up a hacking lab that is both thorough and exhaustive. The examples are clearly depicted for Kali, Ubuntu, OpenSuSE, CentOS and Windows OSs. I have even used and modified some of the scripts for work. The author walks you through the setup, attack and defense with exercises to solidify those concepts. The end of chapter notes and references are the best I've seen in any hacking book. The book does an outstanding job of providing the reader with a well rounded approach to both offensive and defensive cyber operations.

1 of 2 people found the following review helpful. A goldmine. This book reads like a cyber operation in progress. By PaulC My first impressions of this book are very favourable and are becoming more favourable as I read more. 'Cyber Operations' is the perfect description of what you'll find inside. The book reads like a cyber operation in progress.Some big books are filled with waffle and useless images. Not this big fat book. It's packed full of useful information. The author is always to-the-point without waffling or wasting space. You can pretty much point your finger anywhere and you'll hit useful information.Cyber Operations surveys the landscape of tools and techniques that you would be likely to encounter in the real world. If infosec is your thing, you'll find this book exciting and useful. If I were stranded on a desert island with an internet connection and a laptop and could only have one cyber-ops book, this would be it.

See all 2 customer reviews... Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary


Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary PDF
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary iBooks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary ePub
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary rtf
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary AZW
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary Kindle

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, by Mike O'Leary

Tidak ada komentar:

Posting Komentar