Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computer networks, Security measures, Computer securityEdition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
2 |
zzzz
Libraries near you:
WorldCat
|
3 |
zzzz
Libraries near you:
WorldCat
|
4 |
zzzz
Libraries near you:
WorldCat
|
5
Security Power Tools
2007, O’Reilly Media
Paperback
in English
- 1st Edition
0596009631 9780596009632
|
zzzz
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Part 1. Legal and ethics. Legal and ethics issues
Part 2. Reconnaissance. Network scanning
Vulnerability scanning
LAN reconnaissance
Wireless reconnaissance
Custom packet generation
Part 3. Penetration. Metasploit
Wireless penetration
Exploitation framework applications
Custom exploitation
Part 4. Control. Backdoors
Rootkits
Part 5. Defense. Proactive defense : firewalls
Host hardening
Securing communications
Email security and anti-spam
Device security testing
Part 6. Monitoring. Network capture
Network monitoring
Host monitoring
Part 7. Discovery. Forensics
Application fuzzing
Binary reverse engineering.
Edition Notes
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Source records
Library of Congress MARC recordLibrary of Congress MARC record
Library of Congress MARC record
Internet Archive item record
Internet Archive item record
Better World Books record
Library of Congress MARC record
marc_nuls MARC record
harvard_bibliographic_metadata record
Links outside Open Library
Community Reviews (0)
Feedback?June 24, 2022 | Edited by bitnapper | merge authors |
June 24, 2022 | Edited by bitnapper | merge authors |
June 24, 2022 | Edited by bitnapper | Edited without comment. |
June 24, 2022 | Edited by bitnapper | merge authors |
July 18, 2017 | Created by ImportBot | import new book |