Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computer networks, Security measures, Computer securityEdition | Availability |
---|---|
1 |
zzzz
|
2 |
zzzz
|
3 |
aaaa
|
4
Security Power Tools
2007, O’Reilly Media
Paperback
in English
- 1st Edition
0596009631 9780596009632
|
zzzz
|
5 |
zzzz
|
Book Details
Table of Contents
Part 1. Legal and ethics. Legal and ethics issues
Part 2. Reconnaissance. Network scanning
Vulnerability scanning
LAN reconnaissance
Wireless reconnaissance
Custom packet generation
Part 3. Penetration. Metasploit
Wireless penetration
Exploitation framework applications
Custom exploitation
Part 4. Control. Backdoors
Rootkits
Part 5. Defense. Proactive defense : firewalls
Host hardening
Securing communications
Email security and anti-spam
Device security testing
Part 6. Monitoring. Network capture
Network monitoring
Host monitoring
Part 7. Discovery. Forensics
Application fuzzing
Binary reverse engineering.
Edition Notes
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Source records
Library of Congress MARC recordLibrary of Congress MARC record
Library of Congress MARC record
Internet Archive item record
Internet Archive item record
Better World Books record
Library of Congress MARC record
marc_nuls MARC record
harvard_bibliographic_metadata record
Links outside Open Library
Community Reviews (0)
Feedback?History
- Created October 17, 2008
- 14 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
November 28, 2023 | Edited by MARC Bot | import existing book |
March 7, 2023 | Edited by MARC Bot | import existing book |
June 24, 2022 | Edited by bitnapper | Edited without comment. |
June 24, 2022 | Edited by bitnapper | Edited without comment. |
October 17, 2008 | Created by ImportBot | Imported from Library of Congress MARC record |