Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference

Buy

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani is a senior consultant for Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delievred remotely as part of a project sponsored by IBM, AT&T, and Intel.

(HTML tags aren't allowed.)

Manual of Aesthetic Surgery 2
Manual of Aesthetic Surgery 2

This operative manual - in two volumes focuses on the most important and frequent operative procedures in aesthetic plastic surgery. Techniques are displayed in a step-by-step manner with instructive drawings and pre- and post-operative photographs and only as much text as is absolutely necessary to support the illustrations.

...
Flash Web Design The Art of Motion Graphics
Flash Web Design The Art of Motion Graphics
Flash is the perfect tool for creating immersive, interactive, and animated Web site design, and Flash Web Design teaches you to use it to its full potential. The book is broken into two sections: The Essentials and Case Studies. The Essentials section covers the basics of Flash production, illuminating how and...
The Well-Tended Perennial Garden: The Essential Guide to Planting and Pruning Techniques, Third Edition
The Well-Tended Perennial Garden: The Essential Guide to Planting and Pruning Techniques, Third Edition
“This practical guide is lush with clear, step-by-step advice.” —Real Simple

Since its original publication twenty years ago, The Well-Tended Perennial Garden has helped home gardeners successfully plan, plant, and tend their gardens. Now Tracy Di-Sabato-Aust’s trusty advice and
...

The Underwater Photographer, Third Edition: Digital and Traditional Techniques
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
A superb hand-on manual containing a wealth of underwater tips, hints and advice - all beautifully illustrated with brand new, full colour images.

Martin Edge, a leading authority on underwater photography, will help you capture stunning effects using his popular 'think and consider' system - offering a heightened awareness and
...
Google Sites & Chrome For Dummies (Computer/Tech)
Google Sites & Chrome For Dummies (Computer/Tech)
Curious about Google Sites and how team collaboration Web sites can help you share documents online from various locations? Curious about Google’s new Chrome browser? Google Sites & Chrome For Dummies has what you want to know!

Today, Google is so much more than another word for “search.” Google Sites...

Business Intelligence and the Cloud: Strategic Implementation Guide (Wiley and SAS Business Series)
Business Intelligence and the Cloud: Strategic Implementation Guide (Wiley and SAS Business Series)

How to measure cloud computing options and benefits to impact business intelligence infrastructure

This book is a guide for managers and others involved in using cloud computing to create business value. It starts with a discussion of the media hype around cloud computing and attempt to pull together what industry experts...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy