Description
This book provides the readers the following insights into how:
1. Websites are hacked by exploiting command injection, file inclusion, file upload and other vulnerabilities.
2. Databases are compromised by basic and advanced SQL injection.
3. Browser clients are targeted by Cross-Site Scripting attacks.
4. Linux computers are breached by exploiting their vulnerabilities without recourse to social-engineering.
5. Forensic tools can be used to detect malicious intrusions in to systems.
6. Data in transit can be safeguarded by cryptographic and other mechanisms.
7. And cyber security tools that can be deployed against the above described cyber-attacks.
Table of Contents
Chapter 1: Website Attacks.
Chapter 2: Breaking into Linux Computers.
Chapter 3: File Inclusion Web Attacks.
Chapter 4: File Upload Web Attacks.
Chapter 5: Hacking the Database.
Chapter 6: Targeting the Browser.
Chapter 7: Forensics for Defense.
Chapter 8: Protecting Data in Transit.
Chapter 9: Cyber Preparedness.
Author
Debtoru Chatterjee
Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.