Provides details on the critical security tools, explains their function, and demonstrates how to configure them to get the best results. This title includes the security tools, including wireless tools tips on how to configure the tools on Linux, Windows, and Mac OSX on the CD-ROM - Gnoppix, a Linux system, ClamAV anti-virus, and Bluetooth tools.
Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.
Completely revised to include the latest security tools, including wireless tools
New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
New case studies in each chapter
Customer Reviews - Anti-Hacker Tool Kit, Third Edition
Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.
Table of Contents
AcknowledgmentsIntroductionPart I: Multifunctional ToolsChapter 1: Netcat and CryptcatChapter 2: The X Window SystemChapter 3: Virtual Machines & EmulatorsPart II: Tools for Auditing and Defending the HostsChapter 4: Port ScannersChapter 5: Unix Enumeration ToolsChapter 6: Windows Enumeration ToolsChapter 7: Web Hacking ToolsChapter 8: Password Cracking / Brute-Force ToolsChapter 9: Host HardeningChapter 10: Backdoors and Remote Access ToolsChapter 11: Simple Source Auditing ToolsChapter 12: Combination System Auditing ToolsPart III: Tools for Auditing and Defending Your NetworkChapter 13: FirewallsChapter 14: Network Reconnaissance ToolsChapter 15: Port RedirectionChapter 16: SniffersChapter 17: Wireless ToolsChapter 18: War DialersChapter 19: TCP/IP Stack Tools Part IV: Tools for Computer Forensics and Incident ResponseChapter 20: Creating a Bootable Environment and Live Response Tool KitChapter 21: Commercial Forensic Image Tool KitsChapter 22: Open-Source Forensic Duplication Tool KitsChapter 23: Tool Kits to Aid in Forensic AnalysisChapter 24: Tools to Aid in Internet Activity ReconstructionChapter 25: Generalized Editors and ViewersPart V: AppendixesAppendix A: Useful Charts and DiagramsAppendix B: Command-line ReferenceIndex
Anti-Hacker Tool Kit, Third Edition by Mike Shema
Used - Very Good
McGraw-Hill Education - Europe
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us.