19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In this part . . .<br />

W ell, this book has covered everything from<br />

nontechnical hacks to network and mobile hacks<br />

to operating system hacks. What I haven’t yet covered<br />

are the applications that run on top of all this, database<br />

servers, and the storage systems that ensure the data is<br />

available when we need it.<br />

The first chapter in this part covers various messaging<br />

hacks and countermeasures affecting e-mail and Voice<br />

over IP (VoIP) systems. Next, this part looks at web<br />

exploits, along with some countermeasures to secure<br />

websites and applications from the elements. Finally, this<br />

part covers attacks against database servers and storage<br />

systems. It covers both structured data found in various<br />

database systems and unstructured data, otherwise<br />

known as network files.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!