Anti-Hacker Tool Kit, Third Edition
McGraw-Hill Professional (Verlag)
978-0-07-226287-2 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Stop hackers in their tracksOrganized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.
Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter
Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.
AcknowledgmentsIntroductionPart I: Multifunctional ToolsChapter 1: Netcat and CryptcatChapter 2: The X Window SystemChapter 3: Virtual Machines & EmulatorsPart II: Tools for Auditing and Defending the HostsChapter 4: Port ScannersChapter 5: Unix Enumeration ToolsChapter 6: Windows Enumeration ToolsChapter 7: Web Hacking ToolsChapter 8: Password Cracking / Brute-Force ToolsChapter 9: Host HardeningChapter 10: Backdoors and Remote Access ToolsChapter 11: Simple Source Auditing ToolsChapter 12: Combination System Auditing ToolsPart III: Tools for Auditing and Defending Your NetworkChapter 13: FirewallsChapter 14: Network Reconnaissance ToolsChapter 15: Port RedirectionChapter 16: SniffersChapter 17: Wireless ToolsChapter 18: War DialersChapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident ResponseChapter 20: Creating a Bootable Environment and Live Response Tool KitChapter 21: Commercial Forensic Image Tool KitsChapter 22: Open-Source Forensic Duplication Tool KitsChapter 23: Tool Kits to Aid in Forensic AnalysisChapter 24: Tools to Aid in Internet Activity ReconstructionChapter 25: Generalized Editors and ViewersPart V: AppendixesAppendix A: Useful Charts and DiagramsAppendix B: Command-line ReferenceIndex
Erscheint lt. Verlag | 16.3.2006 |
---|---|
Zusatzinfo | 100 Illustrations |
Sprache | englisch |
Maße | 191 x 231 mm |
Gewicht | 1394 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 0-07-226287-7 / 0072262877 |
ISBN-13 | 978-0-07-226287-2 / 9780072262872 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich