Anti-Hacker Tool Kit, Third Edition

Author:   Mike Shema ,  Chris Davis
Publisher:   McGraw-Hill Education - Europe
Edition:   3rd edition
ISBN:  

9780072262872


Pages:   800
Publication Date:   16 March 2006
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $171.57 Quantity:  
Add to Cart

Share |

Anti-Hacker Tool Kit, Third Edition


Add your own review!

Overview

Stop hackers in their tracksOrganized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter

Full Product Details

Author:   Mike Shema ,  Chris Davis
Publisher:   McGraw-Hill Education - Europe
Imprint:   McGraw-Hill Professional
Edition:   3rd edition
Dimensions:   Width: 19.10cm , Height: 4.10cm , Length: 23.10cm
Weight:   1.394kg
ISBN:  

9780072262872


ISBN 10:   0072262877
Pages:   800
Publication Date:   16 March 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Acknowledgments Introduction Part I: Multifunctional Tools Chapter 1: Netcat and Cryptcat Chapter 2: The X Window System Chapter 3: Virtual Machines & Emulators Part II: Tools for Auditing and Defending the Hosts Chapter 4: Port Scanners Chapter 5: Unix Enumeration Tools Chapter 6: Windows Enumeration Tools Chapter 7: Web Hacking Tools Chapter 8: Password Cracking / Brute-Force Tools Chapter 9: Host Hardening Chapter 10: Backdoors and Remote Access Tools Chapter 11: Simple Source Auditing Tools Chapter 12: Combination System Auditing Tools Part III: Tools for Auditing and Defending Your Network Chapter 13: Firewalls Chapter 14: Network Reconnaissance Tools Chapter 15: Port Redirection Chapter 16: Sniffers Chapter 17: Wireless Tools Chapter 18: War Dialers Chapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident Response Chapter 20: Creating a Bootable Environment and Live Response Tool Kit Chapter 21: Commercial Forensic Image Tool Kits Chapter 22: Open-Source Forensic Duplication Tool Kits Chapter 23: Tool Kits to Aid in Forensic Analysis Chapter 24: Tools to Aid in Internet Activity Reconstruction Chapter 25: Generalized Editors and Viewers Part V: Appendixes Appendix A: Useful Charts and Diagrams Appendix B: Command-line Reference Index

Reviews

Author Information

Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List