Security power tools
Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications --...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Beijing, Köln u.a.
O'Reilly
2007
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis Cover |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering |
---|---|
Beschreibung: | XXXII, 822 S. Ill. |
ISBN: | 0596009631 0-596-00963-1 9780596009632 978-0-596-00963-2 |