Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Anti-Hacker Tool Kit, Second Edition  
Author: Mike Shema, Bradley C. Johnson
ISBN: 0072230207
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review


From Book News, Inc.
Explains how to use 100 plus software tools for auditing systems on a network, auditing a network, and investigating incidents. The authors also overview some of the most common hacking programs used in attacks, and how to detect them on a system. Topics include port scanners, vulnerability scanners, password crackers, and war dialers. Among the specific products described are Netcat, Nessus, Tripwire, John the Ripper, and the Forensic Toolkit. The CD-ROM contains demonstration and open source security tools.Book News, Inc.®, Portland, OR




Anti-Hacker Tool Kit

FROM THE PUBLISHER

Stop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Tool Kit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies illustrate how to implement each tool in real-world situations. Protect your network and prevent disasters using the cutting-edge security tools and exclusive information in this completely up-to-date volume.

SYNOPSIS

￯﾿ᄑUsing these tools yourself during an audit will help you find the weaknesses in your systems. This is an excellent reference book—one I plan to keep handy.￯﾿ᄑ —Simple Nomad, Noted security expert and author of The Hack FAQ and Pandora

Put an End to Hacking. Stop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Toolkit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies in each chapter illustrate how to implement each tool in real-world situations. Protect your network and prevent disasters using the cutting-edge security tools and exclusive information in this completely up-to-date volume. Explains how to configure and use these and other key tools: Port scanners: Nmap, SuperScan, IpEye, Scanline Enumeration tools: smbclient, nbtstat, Winfingerprint Web vulnerability scanners: Nikto, WebSleuth, Paros, wget Password crackers: PAM, John the Ripper, L0phtCrack Backdoors: VNC, Sub7, Loki, Knark System auditing tools: Nessus, Retina, STAT, Tripwire Packet filters and firewalls: IPFW, Netfilter/Iptables, Cisco PIX Sniffers: snort, BUTTSniffer, TCPDump/WinDump, Ethereal Wireless tools: NetStumbler, Wellenreiter, kismet War dialers: ToneLoc, THC-Scan Incident response tools: auditpol, Loggedon, NTLast Forensics tools: EnCase, Safeback, Ghost, md5sum, FTK Miscellaneous tools: Netcat, Fpipe, Fport, Cygwin, and many more

CD-ROM contains all the security tools discussed in the book

About the authors: Mike Shema is the Director of Research for NT Objectives, Inc. He is the author of HackNotes Web Security Pocket Reference and co-author of Hacking Exposed Web Applications, both from McGraw-Hill/Osborne. Bradley C. Johnson is a network security specialist with a great deal of experience designing, implementing, and maintaining secure networks. He is the co-author, with Mike Shema, of the first edition of this book.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com