Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Anti-Hacker Tool Kit
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Anti-Hacker Tool Kit

Anti-Hacker Tool Kit

Keith J. Jones, Mike Shema, Bradley C. Johnson

712 pages, parution le 16/07/2002

Résumé

This book continues the best-selling tradition of Hacking ExposedTM -- only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit. -- Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications

Hackers beware!

Stay one step ahead of even the most cunning hackers with help from this invaluable resource. Through proper use and configuration of key security tools, youll be able to investigate and resolve existing problems within your network infrastructure with precision and a minimum of fuss. Written by experienced security professionals, this resource provides you with comprehensive coverage of the most important and up-to-date security tools in use today, explains their function, and shows you how to use each tool effectively through in-depth implementation examples and case studies. Learn to detect and prevent system misconfigurations and Web server hacks plus, discover best practices for protecting both large and small networks. Organized by category and filled with detailed explanations and proven advice, this book is critical for everyone concerned with network security.

Includes best practices for use and configuration of these key tools:

  • Port scanners--Nmap, NetScan, SuperScan, IpEye
  • Enumeration tools--Enum, PSTools, and User2SID
  • BackDoors--NetBus, Back Orifice, and SubSeven
  • Password crackers--Pwltool, SMBGrind, Jack the Ripper, and LSADump2
  • Sniffers--Snort, BUTTSniffer, WinDump, and Dsniff
  • System Audit tools --Nessus, STAT, ISS Internet Scanner
  • Denial of Service tools--Tribe Flood network, Shaft, and Mstreams
  • Wardialers­­THC-scan and ToneLoc
  • Incident response and forensic tools--TCT, EnCase, FTK, and other file viewers
  • Miscellaneous and multi-purpose tools-- Netcat, Getadmin, Fpipe, Fport, VMWare, and many more

Contents

  • PART I: Overview
  • Ch. 1: Necessary Basics
  • Ch. 2: Commercial Tools Overview
  • Ch. 3: Buffer Overflows
  • Ch. 4: Basic Open Source/System Tools
  • PART II: Key Security Tools
  • Ch. 5: Port Scanners
  • Ch. 6: Enumeration Tools
  • Ch. 7: BackDoors and Remote Controlling Tools
  • Ch. 8: Password Cracking/Brute Force Tools
  • Ch. 9: Sniffers
  • Ch. 10: Denial of Service Tools
  • Ch. 11: Wireless Tools
  • Ch. 12: Wardialers
  • Ch. 13: Web Hacking Tools
  • Ch. 14: Data Redirection
  • Ch. 15: Multi-purpose Tools
  • Ch. 16: Investigative Tools
  • PART III: Recipes of Tools in Different Environments
  • Ch. 17: Investigations
  • Ch. 18: Small or Medium Sized Networks
  • Ch. 19: Large or Enterprise Networks
  • Ch. 20: Case Study: Web Server Intrusions

Caractéristiques techniques

  PAPIER
Éditeur(s) Mc Graw Hill
Auteur(s) Keith J. Jones, Mike Shema, Bradley C. Johnson
Parution 16/07/2002
Nb. de pages 712
Format 18,5 x 23
Couverture Broché
Poids 1510g
Intérieur Noir et Blanc
EAN13 9780072222821

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription