Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition

Buy

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:

  • Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options
  • Vulnerability scanners: OpenVAS, Metasploit
  • File system monitors: AIDE, Samhain, Tripwire
  • Windows auditing tools: Nbtstat, Cain, MBSA, PsTools
  • Command-line networking tools: Netcat, Cryptcat, Ncat, Socat
  • Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay
  • Port scanners: Nmap, THC-Amap
  • Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort
  • Network defenses: firewalls, packet filters, and intrusion detection systems
  • War dialers: ToneLoc, THC-Scan, WarVOX
  • Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap
  • Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra
  • Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
  • Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
(HTML tags aren't allowed.)

Internetworking with TCP/IP Volume One (6th Edition)
Internetworking with TCP/IP Volume One (6th Edition)

An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the...

Agile Web Development with Rails 3.2 (Pragmatic Programmers)
Agile Web Development with Rails 3.2 (Pragmatic Programmers)

Rails just keeps on changing. Rails 3 and Ruby 1.9 bring hundreds of improvements, including new APIs and substantial performance enhancements. The fourth edition of this award-winning classic has been reorganized and refocused so it's more useful than ever before for developers new to Ruby and Rails.

Rails
...

IP Over WDM
IP Over WDM

IP over WDM explores the coming together of communication and computer networking technologies: optical fiber using WDM (Wavelength Division Multiplexing) and IP - the Internet Protocol.

Fiber optics technology is revolutionizing the telecommunications and networking industries by offering the enormous capacity required to...


Return on Engagement: Content, Strategy, and Design Techniques for Digital Marketing
Return on Engagement: Content, Strategy, and Design Techniques for Digital Marketing

Achieve the return on engagement that you seek with integrated strategies for honing and maintaining online relationships through personal interaction and compelling digital content. You get specific techniques for Web page optimization, credibility-based design, keyword targeting, viral video, content dissemination through RSS feeds, and...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy