Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference

Buy

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani is a senior consultant for Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delievred remotely as part of a project sponsored by IBM, AT&T, and Intel.

(HTML tags aren't allowed.)

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study) (2nd Edition)
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study) (2nd Edition)

Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP...

Online News and the Public
Online News and the Public
This volume offers unique and timely insights on the state of online news, exploring the issues surrounding this convergence of print and electronic platforms, and the public's response to it. It provides an overview of online newspapers, including current trends and legal issues and covering issues of credibility and perceptions by online news...
Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...


Physical Medicine and Rehabilitation: Principles and Practice (2 Volume Set)
Physical Medicine and Rehabilitation: Principles and Practice (2 Volume Set)

The gold-standard physical medicine and rehabilitation text is now in its Fourth Edition—with thoroughly updated content and a more clinical focus. More than 150 expert contributors—most of them new to this edition—address the full range of issues in contemporary physical medicine and rehabilitation and present...

Encyclopedia of World Cultures, Vol. 1: North America
Encyclopedia of World Cultures, Vol. 1: North America
This volume covers the cultures of Canada, Greenland (Kalaallit Nunaat), and the United States of America. Greenland, although administratively linked to Denmark, is included here because its native inhabitants, the Inuit, are related culturally to the Inuit of Canada. For the same reason, the cultures of Hawaii are covered in the Oceania volume,...
Car Audio For Dummies (Computer/Tech)
Car Audio For Dummies (Computer/Tech)
Welcome to Car Audio For Dummies! My goal in writing this book is to provide you with all the information you need to build the car audio system of your dreams. Whether you want a car audio system that makes it seem as if your favorite band is performing right on top of your dashboard, one that can keep a carload of passengers entertained with...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy