Stop hackers in their tracks
Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.
"synopsis" may belong to another edition of this title.
THWART THE LATEST DISASTROUS ATTACKS
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the information you'll need to lock down your network from the ground up. Logically organized by category, each tool's function, installation, and configuration is fully described, alongside screenshots and code examples. Brand-new examples and in-depth case studies detail how to implement each vital tool in real-world situations.
Explains how to configure and use these and other key tools:
Mike Shema is CSO at NT Objectives, Inc., an application security solutions consultancy.
Chris Davis is a Senior Auditor for Texas Instruments. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne and a regular speaker on computer security topics.
Aaron Phillip is the Managing Partner of Affect Computer Forensics. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne.
David Cowen, CISSP, of G-C Partners, has extensive experience in security research, application security testing, and computer forensics analysis. He is an expert witness and a regular speaker on computer forensics.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Osborne Media, 2006. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Acknowledgments Introduction Part I: Multifunctional Tools Chapter 1: Netcat and Cryptcat Chapter 2: The X Window System Chapter 3: Virtual Machines & Emulators Part II: Tools for Auditing and Defending the Hosts Chapter 4: Port Scanners Chapter 5: Unix Enumeration Tools Chapter 6: Windows Enumeration Tools Chapter 7: Web Hacking Tools Chapter 8: Password Cracking / Brute-Force Tools Chapter 9: Host Hardening Chapter 10: Backdoors and Remote Access Tools Chapter 11: Simple Source Auditing Tools Chapter 12: Combination System Auditing Tools Part III: Tools for Auditing and Defending Your Network Chapter 13: Firewalls Chapter 14: Network Reconnaissance Tools Chapter 15: Port Redirection Chapter 16: Sniffers Chapter 17: Wireless Tools Chapter 18: War Dialers Chapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident Response Chapter 20: Creating a Bootable Environment and Live Response Tool Kit Chapter 21: Commercial Forensic Image Tool Kits Chapter 22: Open-Source Forensic Duplication Tool Kits Chapter 23: Tool Kits to Aid in Forensic Analysis Chapter 24: Tools to Aid in Internet Activity Reconstruction Chapter 25: Generalized Editors and Viewers Part V: Appendixes Appendix A: Useful Charts and Diagrams Appendix B: Command-line Reference Index. Bookseller Inventory # ABE_book_new_0072262877
Book Description McGraw-Hill Osborne Media, 2006. Paperback. Book Condition: New. book. Bookseller Inventory # 0072262877
Book Description McGraw-Hill Osborne Media, 2006. Paperback. Book Condition: New. 3. Bookseller Inventory # DADAX0072262877
Book Description McGraw-Hill Osborne Media, 2006. Paperback. Book Condition: New. Bookseller Inventory # P110072262877
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800722628721.0
Book Description McGraw-Hill Osborne Media. PAPERBACK. Book Condition: New. 0072262877 New Condition. Bookseller Inventory # NEW4.0030218
Book Description McGraw-Hill Osborne Media, 2006. Paperback. Book Condition: Brand New. 3rd paperback/cd-rom edition. 799 pages. 9.00x7.25x1.75 inches. In Stock. Bookseller Inventory # 4-0072262877