Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today.
Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced
For readers looking for hands-on assignments in IT Security.
"synopsis" may belong to another edition of this title.
Seller: Once Upon A Time Books, Siloam Springs, AR, U.S.A.
Paperback. Condition: Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . Seller Inventory # mon0001128438