Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference

Buy

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani is a senior consultant for Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delievred remotely as part of a project sponsored by IBM, AT&T, and Intel.

(HTML tags aren't allowed.)

Digital Image Processing Using MATLAB(R)
Digital Image Processing Using MATLAB(R)
This is the first book that provides a balanced treatment of image processing basics and software principles used in the practical application of image processing. Working in the MATLAB computing environment, it provides a stable, well-supported set of software tools capable of addressing a broad spectrum of applications in digital image...
Diet Diversification and Health Promotion: European Academy of Nutritional Sciences (EANS) Conference, Vienna, May 2004 (Forum of Nutrition, Vol. 57)
Diet Diversification and Health Promotion: European Academy of Nutritional Sciences (EANS) Conference, Vienna, May 2004 (Forum of Nutrition, Vol. 57)

About half of the global burden of disease is due to chronic noncommunicable diseases such as obesity, metabolic disorders, cardiovascular diseases and cancer, which are all related to modifiable risk factors such as unbalanced diet and malnutrition as well as determinants such as behavior and lifestyle. Dietary patterns during the last few...

Gilded Youth: Privilege, Rebellion and the British Public School
Gilded Youth: Privilege, Rebellion and the British Public School
The British public school is an iconic institution, a training ground for the ruling elite and a symbol of national identity and tradition. But beyond the elegant architecture and evergreen playing fields is a turbulent history of teenage rebellion, sexual dissidence, and political radicalism. James Brooke-Smith wades into the...

Advanced Bioimaging Technologies in Assessment of the Quality of Bone and Scaffold Materials: Techniques and Applications
Advanced Bioimaging Technologies in Assessment of the Quality of Bone and Scaffold Materials: Techniques and Applications

This book provides a perspective on the current status of bioimaging technologies developed to assess the quality of musculoskeletal tissue with an emphasis on bone and cartilage. It offers evaluations of scaffold biomaterials developed for enhancing the repair of musculoskeletal tissues. These bioimaging techniques include micro-CT, nano-CT,...

The Passionate Torah: Sex and Judaism
The Passionate Torah: Sex and Judaism

In this unique collection of essays, some of todayÂ’s smartest Jewish thinkers explore a broad range of fundamental questions in an effort to balance ancient tradition and modern sexuality.

In the last few decades a number of factors—post-modernism, feminism, queer liberation, and more—have brought discussion of...

Introduction to Java Programming, Brief Version (9th Edition)
Introduction to Java Programming, Brief Version (9th Edition)

This book teaches programming in a problem-driven way that focuses on problem solving rather than syntax. We make introductory programming interesting by using thought-provoking problems in a broad context. The central thread of early chapters is on problem solving. Appropriate syntax and library are introduced to enable readers to write...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy