HOME > 상세정보

상세정보

Anti-hacker tool kit 3rd ed

Anti-hacker tool kit 3rd ed (2회 대출)

자료유형
단행본
개인저자
Shema, Mike.
서명 / 저자사항
Anti-hacker tool kit / Mike Shema ... [et al.].
판사항
3rd ed.
발행사항
New York :   McGraw-Hill/Osborne ,   c2006.  
형태사항
xxvi, 799 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).
ISBN
0072262877 9780772262872
일반주기
Includes index.  
일반주제명
Data protection. Computer networks -- Security measures.
000 00780camuu2200241 a 4500
001 000045404747
005 20080313134221
008 060331s2006 nyua 001 0 eng d
020 ▼a 0072262877
020 ▼a 9780772262872
035 ▼a (KERIS)BIB000010328790
040 ▼a IKG ▼c IKG ▼d BAKER ▼d 222001 ▼d 244002 ▼d 211009
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A629-3
245 0 0 ▼a Anti-hacker tool kit / ▼c Mike Shema ... [et al.].
250 ▼a 3rd ed.
260 ▼a New York : ▼b McGraw-Hill/Osborne , ▼c c2006.
300 ▼a xxvi, 799 p. : ▼b ill. ; ▼c 24 cm. + ▼e 1 CD-ROM (4 3/4 in.).
500 ▼a Includes index.
650 0 ▼a Data protection.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Shema, Mike.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A629-3 등록번호 121166047 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실/ 청구기호 005.8 A629-3 등록번호 151244355 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A629-3 등록번호 121166047 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 005.8 A629-3 등록번호 151244355 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Acknowledgments

Introduction

Part I: Multifunctional Tools

Chapter 1: Netcat and Cryptcat

Chapter 2: The X Window System

Chapter 3: Virtual Machines & Emulators

Part II: Tools for Auditing and Defending the Hosts

Chapter 4: Port Scanners

Chapter 5: Unix Enumeration Tools

Chapter 6: Windows Enumeration Tools

Chapter 7: Web Hacking Tools

Chapter 8: Password Cracking / Brute-Force Tools

Chapter 9: Host Hardening

Chapter 10: Backdoors and Remote Access Tools

Chapter 11: Simple Source Auditing Tools

Chapter 12: Combination System Auditing Tools

Part III: Tools for Auditing and Defending Your Network

Chapter 13: Firewalls

Chapter 14: Network Reconnaissance Tools

Chapter 15: Port Redirection

Chapter 16: Sniffers

Chapter 17: Wireless Tools

Chapter 18: War Dialers

Chapter 19: TCP/IP Stack Tools

Part IV: Tools for Computer Forensics and Incident Response

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Chapter 21: Commercial Forensic Image Tool Kits

Chapter 22: Open-Source Forensic Duplication Tool Kits

Chapter 23: Tool Kits to Aid in Forensic Analysis

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Chapter 25: Generalized Editors and Viewers

Part V: Appendixes

Appendix A: Useful Charts and Diagrams

Appendix B: Command-line Reference

Index


정보제공 : Aladin

관련분야 신착자료

이관용 (2023)