Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference

Buy

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani is a senior consultant for Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delievred remotely as part of a project sponsored by IBM, AT&T, and Intel.

(HTML tags aren't allowed.)

Ubuntu Linux for Non-Geeks: A Pain-Free, Project-Based, Get-Things-Done Guidebook
Ubuntu Linux for Non-Geeks: A Pain-Free, Project-Based, Get-Things-Done Guidebook

This newbie's guide to Ubuntu lets readers learn by doing. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, stimulating the brain and increasing the reader's understanding. It also covers all the topics likely to be of interest to an average desktop user, such as...

Applications of Evolutionary Computing: EvoWorkshops 2007:EvoCOMNET, EvoFIN, EvoIASP, EvoINTERACTION, EvoMUSART, EvoSTOC, and EvoTransLog, Valencia, Spain
Applications of Evolutionary Computing: EvoWorkshops 2007:EvoCOMNET, EvoFIN, EvoIASP, EvoINTERACTION, EvoMUSART, EvoSTOC, and EvoTransLog, Valencia, Spain
This book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2007, held in Valencia, Spain in April 2007.

The 55 revised full papers and 24 revised short papers presented were carefully reviewed and selected from a total of 160 submissions. In accordance with the seven workshops covered, the...

International Project Management
International Project Management
International Project Management provides specific guidelines for achieving greater project success. It is the result of 15 years of work on international projects by the authors across various project areas and industries. The authors address a need for modern techniques in project management geared and suited to international...

Next Generation Java Testing: TestNG and Advanced Concepts
Next Generation Java Testing: TestNG and Advanced Concepts
Enterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing...
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities
With the rapid growth of the wireless mobile applications, wireless voice has
begun to challenge wireline voice, whereas the desire to access e-mail, surf the
Web or download music (e.g., MP3) wirelessly is increasing for wireless data.
While second generation (2G) cellular wireless systems, such as cdmaOne1,
GSM2 and TDMA3,
...
Managing Time
Managing Time

Learning Made Simple books give you skills without frills. They are matched to the main qualifications and written by experienced teachers and authors to make often tricky subjects simple to learn. Every book is designed carefully to provide bite-sized lessons matched to readers' needs.

Using full
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy