HOME > Detail View

Detail View

Anti-hacker tool kit 3rd ed

Anti-hacker tool kit 3rd ed (Loan 2 times)

Material type
단행본
Personal Author
Shema, Mike.
Title Statement
Anti-hacker tool kit / Mike Shema ... [et al.].
판사항
3rd ed.
Publication, Distribution, etc
New York :   McGraw-Hill/Osborne ,   c2006.  
Physical Medium
xxvi, 799 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).
ISBN
0072262877 9780772262872
General Note
Includes index.  
Subject Added Entry-Topical Term
Data protection. Computer networks -- Security measures.
000 00780camuu2200241 a 4500
001 000045404747
005 20080313134221
008 060331s2006 nyua 001 0 eng d
020 ▼a 0072262877
020 ▼a 9780772262872
035 ▼a (KERIS)BIB000010328790
040 ▼a IKG ▼c IKG ▼d BAKER ▼d 222001 ▼d 244002 ▼d 211009
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A629-3
245 0 0 ▼a Anti-hacker tool kit / ▼c Mike Shema ... [et al.].
250 ▼a 3rd ed.
260 ▼a New York : ▼b McGraw-Hill/Osborne , ▼c c2006.
300 ▼a xxvi, 799 p. : ▼b ill. ; ▼c 24 cm. + ▼e 1 CD-ROM (4 3/4 in.).
500 ▼a Includes index.
650 0 ▼a Data protection.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Shema, Mike.

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A629-3 Accession No. 121166047 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.8 A629-3 Accession No. 151244355 Availability Available Due Date Make a Reservation Service
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A629-3 Accession No. 121166047 Availability Available Due Date Make a Reservation Service B M
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.8 A629-3 Accession No. 151244355 Availability Available Due Date Make a Reservation Service

Contents information

Table of Contents

Acknowledgments

Introduction

Part I: Multifunctional Tools

Chapter 1: Netcat and Cryptcat

Chapter 2: The X Window System

Chapter 3: Virtual Machines & Emulators

Part II: Tools for Auditing and Defending the Hosts

Chapter 4: Port Scanners

Chapter 5: Unix Enumeration Tools

Chapter 6: Windows Enumeration Tools

Chapter 7: Web Hacking Tools

Chapter 8: Password Cracking / Brute-Force Tools

Chapter 9: Host Hardening

Chapter 10: Backdoors and Remote Access Tools

Chapter 11: Simple Source Auditing Tools

Chapter 12: Combination System Auditing Tools

Part III: Tools for Auditing and Defending Your Network

Chapter 13: Firewalls

Chapter 14: Network Reconnaissance Tools

Chapter 15: Port Redirection

Chapter 16: Sniffers

Chapter 17: Wireless Tools

Chapter 18: War Dialers

Chapter 19: TCP/IP Stack Tools

Part IV: Tools for Computer Forensics and Incident Response

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Chapter 21: Commercial Forensic Image Tool Kits

Chapter 22: Open-Source Forensic Duplication Tool Kits

Chapter 23: Tool Kits to Aid in Forensic Analysis

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Chapter 25: Generalized Editors and Viewers

Part V: Appendixes

Appendix A: Useful Charts and Diagrams

Appendix B: Command-line Reference

Index


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)