Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition

Buy

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:

  • Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options
  • Vulnerability scanners: OpenVAS, Metasploit
  • File system monitors: AIDE, Samhain, Tripwire
  • Windows auditing tools: Nbtstat, Cain, MBSA, PsTools
  • Command-line networking tools: Netcat, Cryptcat, Ncat, Socat
  • Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay
  • Port scanners: Nmap, THC-Amap
  • Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort
  • Network defenses: firewalls, packet filters, and intrusion detection systems
  • War dialers: ToneLoc, THC-Scan, WarVOX
  • Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap
  • Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra
  • Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
  • Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
(HTML tags aren't allowed.)

Causal Mapping for Research in Information Technology
Causal Mapping for Research in Information Technology
Causal maps represent cognition as a system of cause-effect relations for the purpose
of capturing the structure of human cognition from texts, either archival or interview
generated. Given the structure of causal maps, they can be represented pictorially, or
as matrices. Once these cognitive structures have been represented, they
...
Pro TypeScript: Application-Scale JavaScript Development
Pro TypeScript: Application-Scale JavaScript Development

Explore the features of this innovative open source language in depth, from working with the type system through object-orientation to understanding the runtime and the TypeScript compiler. This fully revised and updated second edition of Steve Fenton’s popular book covers everything you need to discover this fascinating...

Programming Web Services with Perl
Programming Web Services with Perl
Programming Web Services with Perl is written for Perl programmers who have no prior knowledge of web services. No understanding of XML-RPC or SOAP is necessary to be able to apply these technologies easily, through the use of publicly available Perl modules detailed in the book. If you're interested in applying...

Red Hat Fedora Linux Secrets
Red Hat Fedora Linux Secrets
Learn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the...
Practical Insight into Cmmi (Artech House Computing Library)
Practical Insight into Cmmi (Artech House Computing Library)
This book provides the reader with an insight into which an activities an
organization would be engaged and what the role of each level of management
and the practitioners would be if their systems and software engineering
processes were based onCMM®IntegrationSM. It captures the essence
of each of the process areas by
...
Managerial Dilemmas: Exploiting paradox for strategic leadership
Managerial Dilemmas: Exploiting paradox for strategic leadership

In the midst of the most severe recession for 80 years there is little need to argue that organizations are beset by dilemmas and paradoxes. Confidence in prevailing business models and in the underlying assumptions underpinning business decisions over many decades has now been shaken. But it is not enough to rail against arrogance and greed....

©2019 LearnIT (support@pdfchm.net) - Privacy Policy