Description |
xxiii, 711 pages : illustrations ; 24 cm + 1 CD-ROM (4 3/4 in.) |
Contents |
Machine derived contents note: Part I: Multifunctional and Miscellaneous Tools -- 1: Netcat and Cryptcat -- 2: The X Window System -- 3: Emulators -- Part II: Tools for Auditing and Defending the Hosts -- 4: Port Scanners -- 5: Unix Enumeration Tools -- 6: Windows Enumeration Tools -- 7: Web Hacking Tools -- 8: Password Cracking / Brute-Force Tools -- 9: Host Hardening -- 10: Backdoors and Remote Access Tools -- 11: Simple Source Auditing Tools -- 12: Combination System Auditing Tools -- Part III: Tools for Auditing and Defending Your Network -- 13: Firewalls -- 14: Network Reconnaissance Tools -- 15: Port Redirection -- 16: Sniffers -- 17: Wireless Tools -- 18: War Dialers -- 19: TCP/IP Stack Tools -- Part IV: Tools for Computer Forensics and Incident Response -- 20: Creating a Bootable Environment and Live Response Tool Kit -- 21: Commercial Forensic Duplication Tool Kits -- 22: Open-Source Forensic Duplication Tool Kits -- 23: Tool Kits to Aid in Forensic Analysis -- 24: Tools to Aid in Internet Activity Reconstruction -- 25: Generalized Editors and Viewers -- Part V: Appendixes -- A: Useful Charts and Diagrams -- B: About the CD-ROM |
Notes |
Includes index |
|
One CD-ROM in pocket attached to inside back cover |
Bibliography |
Includes index |
Subject |
Computer networks -- Security measures.
|
|
Data protection.
|
|
Computer security.
|
Author |
Shema, Mike.
|
|
Johnson, Bradley C.
|
LC no. |
2004304906 |
ISBN |
0072222824 paperback |
|
0072222840 CDROM |
|
0072222832 book |
|