Anti-Hacker Tool Kit, Third Edition

Anti-Hacker Tool Kit, Third Edition

Anti-Hacker Tool Kit, Third Edition

Anti-Hacker Tool Kit, Third Edition

eBook

$40.99  $54.00 Save 24% Current price is $40.99, Original price is $54. You Save 24%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

  • Completely revised to include the latest security tools, including wireless tools
  • New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
  • New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
  • New case studies in each chapter

Product Details

ISBN-13: 9780071486910
Publisher: McGraw Hill LLC
Publication date: 03/01/2006
Sold by: Barnes & Noble
Format: eBook
Pages: 800
File size: 31 MB
Note: This product may take a few minutes to download.

About the Author

Mike Shema is CSO at NT Objectives, Inc., an application security solutions consultancy.

Chris Davis is a Senior Auditor for Texas Instruments. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne and a regular speaker on computer security topics.

Aaron Phillip is the Managing Partner of Affect Computer Forensics. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne.

David Cowen, CISSP, of G-C Partners, has extensive experience in security research, application security testing, and computer forensics analysis. He is an expert witness and a regular speaker on computer forensics.

Table of Contents

Acknowledgments Introduction Part I: Multifunctional Tools Chapter 1: Netcat and Cryptcat Chapter 2: The X Window System Chapter 3: Virtual Machines & Emulators Part II: Tools for Auditing and Defending the Hosts Chapter 4: Port Scanners Chapter 5: Unix Enumeration Tools Chapter 6: Windows Enumeration Tools Chapter 7: Web Hacking Tools Chapter 8: Password Cracking / Brute-Force Tools Chapter 9: Host Hardening Chapter 10: Backdoors and Remote Access Tools Chapter 11: Simple Source Auditing Tools Chapter 12: Combination System Auditing Tools Part III: Tools for Auditing and Defending Your Network Chapter 13: Firewalls Chapter 14: Network Reconnaissance Tools Chapter 15: Port Redirection Chapter 16: Sniffers Chapter 17: Wireless Tools Chapter 18: War Dialers Chapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident Response Chapter 20: Creating a Bootable Environment and Live Response Tool Kit Chapter 21: Commercial Forensic Image Tool Kits Chapter 22: Open-Source Forensic Duplication Tool Kits Chapter 23: Tool Kits to Aid in Forensic Analysis Chapter 24: Tools to Aid in Internet Activity Reconstruction Chapter 25: Generalized Editors and Viewers Part V: Appendixes Appendix A: Useful Charts and Diagrams Appendix B: Command-line Reference Index
From the B&N Reads Blog

Customer Reviews