Silence on the Wire
Encyclopedia
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks is the title of a book
Book
A book is a set or collection of written, printed, illustrated, or blank sheets, made of hot lava, paper, parchment, or other materials, usually fastened together to hinge at one side. A single sheet within a book is called a leaf or leaflet, and each side of a leaf is called a page...

 by Michał Zalewski on some network-silent methods of information gathering as they relate to computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

. No Starch Press
No Starch Press
No Starch Press is a publishing company specializing in computer books for the technically savvy, or "geek entertainment" as they term it. They have published such titles as Hacking: The Art of Exploitation, Silence on the Wire, Steal This Computer Book 4.0, Steal This File Sharing Book, Write...

 published
Publishing
Publishing is the process of production and dissemination of literature or information—the activity of making information available to the general public...

 the book in April, 2005. The following is a description of the book from No Starch Press' web site
Website
A website, also written as Web site, web site, or simply site, is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet...

.
Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems.

Table of contents

  • Part I: The Source
    • Chapter 1: I Can Hear You Typing
    • Chapter 2: Extra Efforts Never Go Unnoticed
    • Chapter 3: Ten Heads of the Hydra
    • Chapter 4: Working for the Common Good
  • Part II: On the Wire
    • Chapter 5: Blinkenlights
    • Chapter 6: Echoes of the Past
    • Chapter 7: Secure in Switched Networks
    • Chapter 8: Us Versus Them
  • Part III: Out in the Wild
    • Chapter 9: Foreign Accent
    • Chapter 10: Advanced Sheep Counting Strategies
    • Chapter 11: In Recognition of Anomalies
    • Chapter 12: Stack Data Leaks
    • Chapter 13: Smoke And Mirrors
    • Chapter 14: Client Identification: Papers, Please!
    • Chapter 15: Epilogue: Benefits of Being a Victim
  • Part IV: The Big Picture
    • Chapter 16: Parasitic Computing, or How Pennies Add Up
    • Chapter 17: Topology of the Network
    • Chapter 18: Watching the Void
    • Chapter 19: Closing Words


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK