Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference

Buy

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani is a senior consultant for Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delievred remotely as part of a project sponsored by IBM, AT&T, and Intel.

(HTML tags aren't allowed.)

Windows 7 Para Dummies
Windows 7 Para Dummies

Straightforward, easy-to-use Windows 7 reference and guide forSpanish speakers.

Microsoft's Windows 7, the long-awaited replacement for WindowsVista has arrived, and now you can learn the basics of this newoperating system with this practical guide. Understand the new userinterface, set up your desktop, cover basic...

Digital Painting Fundamentals with Corel Painter X
Digital Painting Fundamentals with Corel Painter X
Digital Painting Fundamentals with Corel Painter X is an introduction to drawing and painting using a Wacom graphics tablet and the industry standard software for pixel-based art. Each chapter is full of exercises designed to teach basic skills, such as eye-hand coordination. Easy-to-follow projects lead you from a simple, still life sketch to...
The Sisters Are Alright: Changing the Broken Narrative of Black Women in America
The Sisters Are Alright: Changing the Broken Narrative of Black Women in America

What's wrong with black women? Not a damned thing!
The Sisters Are Alright exposes anti–black-woman propaganda and shows how real black women are pushing back against distorted cartoon versions of themselves.

When
...


Project5 Power!
Project5 Power!
Project5, Cakewalk’s complete software studio suite, includes synthesizers, a sampler, a sequencer,and tools for creating and utilizing beats and loops. This powerful program can be used to create and record an entire piece of music by itself, or as a complement to another DAW (Digital Audio Workstation) application. In short, Project5 is a...
Taking Your OS X Lion to the Max (Technology in Action)
Taking Your OS X Lion to the Max (Technology in Action)

The Mac has come a long way, and OS X Lion is the best version yet of Apple's desktop and laptop operating system. Stable, powerful, and versatile, the Mac allows you to do everyday tasks with ease.

Taking Your OS X Lion to the Max walks you through the awesome features and apps standard on
...

Macs on the Go!: Mobile Computing Guide
Macs on the Go!: Mobile Computing Guide
With laptops, notebooks, and tablet PCs slated to make up more than half of all U.S. personal computer sales by 2007, mobile computing is no longer limited to business users and gadget hounds. If you plan to take your Mac on the road, this book shows you how to do so quickly, effectively, and with a minimum of hassle and headaches! In a friendly,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy