Seven Deadliest Microsoft Attacks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Seven Deadliest Microsoft Attacks by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern ISBN: 9781597495523
Publisher: Elsevier Science Publication: March 1, 2010
Imprint: Syngress Language: English
Author: Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
ISBN: 9781597495523
Publisher: Elsevier Science
Publication: March 1, 2010
Imprint: Syngress
Language: English

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.

This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.

  1. Windows Operating System-Password Attacks
  2. Active Directory-Escalation of Privilege
  3. SQL Server-Stored Procedure Attacks
  4. Exchange Server-Mail Service Attacks
  5. Office-Macros and ActiveX
  6. Internet Information Serives(IIS)-Web Serive Attacks
  7. SharePoint-Multi-tier Attacks
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.

This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.

  1. Windows Operating System-Password Attacks
  2. Active Directory-Escalation of Privilege
  3. SQL Server-Stored Procedure Attacks
  4. Exchange Server-Mail Service Attacks
  5. Office-Macros and ActiveX
  6. Internet Information Serives(IIS)-Web Serive Attacks
  7. SharePoint-Multi-tier Attacks

More books from Elsevier Science

Cover of the book Bone Mineral Metabolism in Cancer by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Mucosal Health in Aquaculture by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Distributed Generation and its Implications for the Utility Industry by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Tsunamiites - Features and Implications by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Coal and Coal-Related Compounds by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Precision Motion Systems by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Academic Crowdsourcing in the Humanities by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Handbook of Organic Solvent Properties by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Databook of Blowing and Auxiliary Agents by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Chemical Imaging Analysis by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Characterization of Semiconductor Heterostructures and Nanostructures by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Learning and Memory by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Cleaning with Solvents by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Abrasive Water Jet Perforation and Multi-Stage Fracturing by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Cover of the book Introduction to Continuum Mechanics by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy