Warriors B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Q&A | May 20, 2015

    Michael Perry: IMG Powell's Q&A: Michael Perry



    Describe your latest book. On Christmas Eve itself, the bachelor Harley Jackson stepped into his barn and beheld there illuminated in the straw a... Continue »
    1. $18.19 Sale Hardcover add to wish list

      The Jesus Cow

      Michael Perry 9780062289919

    spacer
Qualifying orders ship free.
$2.50
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Networking- Computer Security

Anti Hacker Tool Kit Key Security Tools

by

Anti Hacker Tool Kit Key Security Tools Cover

 

Synopses & Reviews

Publisher Comments:

"This book continues the best-selling tradition of Hacking Exposed--only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit." — Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications

Stay one step ahead of even the most cunning hackers with help from this invaluable resource. Through proper use and configuration of key security tools, you'll be able to investigate and resolve existing problems within your network infrastructure with precision and a minimum of fuss. Written by experienced security professionals, this resource provides you with comprehensive coverage of the most important and up-to-date security tools in use today, explains their function, and shows you how to use each tool effectively through in-depth implementation examples and case studies. Learn to detect and prevent system misconfigurations and Web server hacks plus, discover best practices for protecting both large and small networks.

Includes best practices for use and configuration of these key tools:

  • Port scanners--Nmap, NetScan, SuperScan, IpEye
  • Enumeration tools--Enum, PSTools, and User2SID
  • BackDoors--NetBus, Back Orifice, and SubSeven
  • Password crackers--Pwltool, SMBGrind, Jack the Ripper, and LSADump2
  • Sniffers--Snort, BUTTSniffer, WinDump, and Dsniff
  • System Audit tools --Nessus, STAT, ISS Internet Scanner
  • Denial of Service tools--Tribe Flood network, Shaft, and Mstreams
  • Wardialers­­THC-scan and ToneLoc
  • Incident response and forensic tools--TCT, EnCase, FTK, and other file viewers
  • Miscellaneous and multi-purpose tools-- Netcat, Getadmin, Fpipe, Fport, VMWare, and many more

Book News Annotation:

Explains how to use 100 plus software tools for auditing systems on a network, auditing a network, and investigating incidents. The authors also overview some of the most common hacking programs used in attacks, and how to detect them on a system. Topics include port scanners, vulnerability scanners, password crackers, and war dialers. Among the specific products described are Netcat, Nessus, Tripwire, John the Ripper, and the Forensic Toolkit. The CD-ROM contains demonstration and open source security tools.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

This volume provides detailed, experience-based coverage on key security tools and how to use them. Each tool discussion has tips and advice on how to configure tools to get the best results.

Synopsis:

Get in?depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.

Table of Contents

Part I: Multifunctional Tools

1: Netcat and Cryptcat

2: Open Source/System Tools: The Basics

3: The X Window System

4: VMware

5: Cygwin

Part II: Tools for Attacking and Auditing Systems on the Net

6: Port Scanners

7: Windows Enumeration Tools

8: Web Hacking Tools

9: Password Cracking/Brute-Force Tools

10: Backdoors and Remote Access Tools

11: Simple Source Auditing Tools

12: Combination System Auditing Tools

Part III: Tools for Attacking and Auditing the Network

13: Port Redirection

14: Sniffers

15: Wireless Tools

16: War Dialers

17: TCP/IP Stack Tools

Part IV: Tools Used in Forensics and Incident Response

18: Building (and Using) a Windows Live Response Tool Kit

19: Building and Using a Unix Live Response Tool Kit

20: Commercial Forensic Duplication Tool Kits

21: A Noncommercial Forensic Duplication Tool Kit

22: Tool Kits to Aid in Forensic Analysis

23: Tools to Aid in Internet Activity Reconstruction

24: Generalized Editors and Viewers

Appendix: Useful Charts and Diagrams

Product Details

ISBN:
9780072222821
Subtitle:
Key Security Tools and Configuration Techniques (with CD-ROM) with CDROM
Author:
Jones, Keith J.
Author:
Shema, Mike
Author:
Johnson, Bradley C.
Publisher:
Osborne/McGraw-Hill
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Internet - Security
Subject:
Security
Copyright:
Series:
One Off
Publication Date:
June 2002
Binding:
Paperback
Language:
English
Illustrations:
Y
Pages:
711
Dimensions:
9.04x7.33x1.69 in. 3.30 lbs.

Other books you might like

  1. The Code Book Used Hardcover $10.50
  2. Delphi in a Nutshell (In a Nutshell) Used Trade Paper $13.95
  3. Parliamentary Versus Presidential... Used Trade Paper $42.00
  4. Capacity Planning for Web Services:... New Trade Paper $74.25

Related Subjects

Computers and Internet » Networking » Computer Security

Anti Hacker Tool Kit Key Security Tools Used Trade Paper
0 stars - 0 reviews
$2.50 In Stock
Product details 711 pages MCGRAW HILL COMPANIES - English 9780072222821 Reviews:
"Synopsis" by , This volume provides detailed, experience-based coverage on key security tools and how to use them. Each tool discussion has tips and advice on how to configure tools to get the best results.
"Synopsis" by , Get in?depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.