|
![]() |
|||
|
||||
OverviewStop hackers in their tracksOrganized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter Full Product DetailsAuthor: Mike Shema , Chris DavisPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Edition: 3rd edition Dimensions: Width: 19.10cm , Height: 4.10cm , Length: 23.10cm Weight: 1.394kg ISBN: 9780072262872ISBN 10: 0072262877 Pages: 800 Publication Date: 16 March 2006 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsAcknowledgments Introduction Part I: Multifunctional Tools Chapter 1: Netcat and Cryptcat Chapter 2: The X Window System Chapter 3: Virtual Machines & Emulators Part II: Tools for Auditing and Defending the Hosts Chapter 4: Port Scanners Chapter 5: Unix Enumeration Tools Chapter 6: Windows Enumeration Tools Chapter 7: Web Hacking Tools Chapter 8: Password Cracking / Brute-Force Tools Chapter 9: Host Hardening Chapter 10: Backdoors and Remote Access Tools Chapter 11: Simple Source Auditing Tools Chapter 12: Combination System Auditing Tools Part III: Tools for Auditing and Defending Your Network Chapter 13: Firewalls Chapter 14: Network Reconnaissance Tools Chapter 15: Port Redirection Chapter 16: Sniffers Chapter 17: Wireless Tools Chapter 18: War Dialers Chapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident Response Chapter 20: Creating a Bootable Environment and Live Response Tool Kit Chapter 21: Commercial Forensic Image Tool Kits Chapter 22: Open-Source Forensic Duplication Tool Kits Chapter 23: Tool Kits to Aid in Forensic Analysis Chapter 24: Tools to Aid in Internet Activity Reconstruction Chapter 25: Generalized Editors and Viewers Part V: Appendixes Appendix A: Useful Charts and Diagrams Appendix B: Command-line Reference IndexReviewsAuthor InformationMike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. Tab Content 6Author Website:Countries AvailableAll regions |