Anti-Hacker Tool Kit, Third Edition - Mike Shema, Chris Davis

Anti-Hacker Tool Kit, Third Edition

, (Autoren)

Buch | Softcover
800 Seiten
2006 | 3rd edition
McGraw-Hill Professional (Verlag)
978-0-07-226287-2 (ISBN)
51,60 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Provides details on the critical security tools, explains their function, and demonstrates how to configure them to get the best results. This title includes the security tools, including wireless tools tips on how to configure the tools on Linux, Windows, and Mac OSX on the CD-ROM - Gnoppix, a Linux system, ClamAV anti-virus, and Bluetooth tools.
Stop hackers in their tracksOrganized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter

Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.

AcknowledgmentsIntroductionPart I: Multifunctional ToolsChapter 1: Netcat and CryptcatChapter 2: The X Window SystemChapter 3: Virtual Machines & EmulatorsPart II: Tools for Auditing and Defending the HostsChapter 4: Port ScannersChapter 5: Unix Enumeration ToolsChapter 6: Windows Enumeration ToolsChapter 7: Web Hacking ToolsChapter 8: Password Cracking / Brute-Force ToolsChapter 9: Host HardeningChapter 10: Backdoors and Remote Access ToolsChapter 11: Simple Source Auditing ToolsChapter 12: Combination System Auditing ToolsPart III: Tools for Auditing and Defending Your NetworkChapter 13: FirewallsChapter 14: Network Reconnaissance ToolsChapter 15: Port RedirectionChapter 16: SniffersChapter 17: Wireless ToolsChapter 18: War DialersChapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident ResponseChapter 20: Creating a Bootable Environment and Live Response Tool KitChapter 21: Commercial Forensic Image Tool KitsChapter 22: Open-Source Forensic Duplication Tool KitsChapter 23: Tool Kits to Aid in Forensic AnalysisChapter 24: Tools to Aid in Internet Activity ReconstructionChapter 25: Generalized Editors and ViewersPart V: AppendixesAppendix A: Useful Charts and DiagramsAppendix B: Command-line ReferenceIndex

Erscheint lt. Verlag 16.3.2006
Zusatzinfo 100 Illustrations
Sprache englisch
Maße 191 x 231 mm
Gewicht 1394 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 0-07-226287-7 / 0072262877
ISBN-13 978-0-07-226287-2 / 9780072262872
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00