Anti-hacker tool kit

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration...

Full description

Saved in:
Bibliographic Details
Main Author: Shema, Mike (Author)
Format: Book
Language:English
Published: New York, NY McGraw-Hill Education 2014
Edition:Fourth edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100762
003 MY-KLNDU
005 20241220025551.0
008 221104 2014 nyua i 000 0 eng d
020 |a 9780071800143 
020 |a 007180014X 
039 9 |a 202211041125  |b VLOAD  |c 201501141421  |d zul  |c 201411251635  |d azraai  |y 201410131524  |z hasniza 
040 |a UPNM  |b eng  |b UPNM  |e rda 
090 |a TK 5105.59  |b .S5233 2014 
100 1 |a Shema, Mike  |e author 
245 1 0 |a Anti-hacker tool kit  |c Mike Shema 
250 |a Fourth edition 
264 1 |a New York, NY  |b McGraw-Hill Education  |c 2014 
300 |a xxii, 601 pages  |b illustrations  |c 23 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |1 volume  |2 rdacarrier 
500 |a Includes index 
505 0 |a pt. I. The Best of the Basics -- 1. Managing Source Code and Working with Programming Languages -- 2. Command-Line Environments -- 3. Virtual Machines and Emulators -- pt. II. Systems -- 4. Vulnerability Scanning -- 5. File System Monitoring -- 6. Windows Auditing -- pt. III. Networks -- 7. Netcat -- 8. Port Forwarding and Redirection -- 9. Network Reconnaissance -- 10. Network Sniffers and Injectors -- 11. Network Defenses -- 12. War Dialers -- pt. IV. Applications -- 13. Binary Analysis -- 14. Web Application Hacking -- 15. Password Cracking and Brute-Force Tools -- pt. V. Forensics -- 16. Basic Forensics -- 17. Privacy Tools 
520 |a Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. 
592 |a 00013777  |b 14/11/14  |c RM160.00  |h PVK 
650 0 |a Computer networks  |x Security measures 
650 0 |a Data protection 
999 |a vtls000052923  |c 100762  |d 100762