Anti-hacker tool kit / Mike Shema ... [et al.].
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5105.59 .J65 2006 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000171447 | |
![]() |
Main Library | TK5105.59 .J65 2006 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000153450 |
Browsing Female Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5105.59 .H357 2005 Network security : a practical approach / | TK5105.59 .H47 2015 Computational network science : an algorithmic approach / | TK5105.59 .H66 2006 Enterprise Web services security / | TK5105.59 .J65 2006 Anti-hacker tool kit / | TK5105.59 .L32 2005 Network security fundamentals / | TK5105.59 .L58 2009 Cisco router and switch forensics : investigating and analyzing malicious network activity / | TK5105.59 .M362 2004 Fundamentals of network security / |
Rev. ed. of: Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson. 1st ed.
Includes index.
1. Netcat and Cryptcat -- 2. The X Window system -- 3. Virtual machines & emulators -- 4. Port scanners -- 5. Unix enumeration tools -- 6. Windows enumeration tools -- 7. Web hacking tools -- 8. Password cracking/brute-force tools -- 9. Host hardening -- 10. Backdoors and remote access tools -- 11. Simple source auditing tools -- 12. Combination system auditing tools -- 13. Firewalls -- 14. Network reconnaissance tools -- 15. Port redirection -- 16. Sniffers -- 17. Wireless tools -- 18. War dialers -- 19. TCP/IP stack tools -- 20. Creating a bootable environment and live response tool kit -- 21. Commercial forensic image tool kits -- 22. Open-source forensic duplication tool kits -- 23. Tool kits to aid in forensic analysis -- 24. Tools to aid in Internet activity reconstruction -- 25. Generalized editors and viewers -- 26. Reverse engineering binaries -- App. Command-line reference.
"Anti-Hacker's Tool Kit, Third Edition provides all the information you'll need to lock down your network from the ground up. Logically organized by category, each tool's function, installation, and configuration is fully described, alongside screenshots and code examples. Brand-new examples and in-depth case studies detail how to implement each vital tool in real-world situations."--BOOK JACKET.
System requirements for accompanying CD-ROM: Adobe Acrobat Reader.
1 2
There are no comments on this title.