Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition

Buy

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:

  • Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options
  • Vulnerability scanners: OpenVAS, Metasploit
  • File system monitors: AIDE, Samhain, Tripwire
  • Windows auditing tools: Nbtstat, Cain, MBSA, PsTools
  • Command-line networking tools: Netcat, Cryptcat, Ncat, Socat
  • Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay
  • Port scanners: Nmap, THC-Amap
  • Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort
  • Network defenses: firewalls, packet filters, and intrusion detection systems
  • War dialers: ToneLoc, THC-Scan, WarVOX
  • Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap
  • Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra
  • Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
  • Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
(HTML tags aren't allowed.)

Problem Solving Methods
Problem Solving Methods

Researchers in Artificial Intelligence have traditionally been classified into two categories: the “neaties” and the “scruffies”. According to the scruffies, the neaties concentrate on building elegant formal frameworks, whose properties are beautifully expressed by means of definitions, lemmas, and theorems, but...

Mac OS X in a Nutshell
Mac OS X in a Nutshell
Mac OS X is a stunning technical achievement--a virtually crash-proof Unix core paired with the sleek Aqua interface, bringing style, usability, and stability to a new level. It has almost everything that Macintosh fans have been waiting for: protected memory, crash resistance, and the ability to run the 18,000 existing Mac programs and an...
Linux Administration Made Easy
Linux Administration Made Easy
The Linux Administration Made Easy (LAME) guide attempts to describe day-to-day administration and maintenance issues commonly faced by Linux system administrators. This book is part of the Linux Documentation Project.

Linux Administration Made Easy summarizes the installation and configuration, as well as the day-to-day administrative and...


Schaum's Easy Outline of Principles of Economics
Schaum's Easy Outline of Principles of Economics
For students looking for a quick nuts and bolts overview to the Principles of Economics. Gives students quick pointers to the essentials. Softcover.

About the Author
Dominic Salvatore, Ph.D., is Distinguished Professor of Economics and Department Chairman at Fordham University in New York. He is a Fellow of
...
JSP Examples and Best Practices
JSP Examples and Best Practices

While most other books merely instruct on basic JSP and servlet development, JSP Examples and Best Practices gives you some of the best practices and design principles, enabling you to build scalable and extensible enterprise Java applications. And JavaServer Pages technology can be used to build complex enterprise applications in...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy