TOP
0
0
即日起~7/10,三民書局週年慶暖身活動,簽到拿好禮!
ANTI HACKER TOOL KIT
90折

ANTI HACKER TOOL KIT

商品資訊

定價
:NT$ 2099 元
優惠價
901889
無庫存,下單後進貨(到貨天數約45天)
可得紅利積點:56 點
相關商品
商品簡介
作者簡介
目次

商品簡介

Stop hackers in their tracks

Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

  • Completely revised to include the latest security tools, including wireless tools
  • New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
  • New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
  • New case studies in each chapter

作者簡介

Mike Shema is CSO at NT Objectives, Inc., an application security solutions consultancy.

Chris Davis is a Senior Auditor for Texas Instruments. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne and a regular speaker on computer security topics.

Aaron Phillip is the Managing Partner of Affect Computer Forensics. He is the co-author of Hacking Exposed Computer Forensics from McGraw-Hill/Osborne.

David Cowen, CISSP, of G-C Partners, has extensive experience in security research, application security testing, and computer forensics analysis. He is an expert witness and a regular speaker on computer forensics.

目次

Acknowledgments

Introduction

Part I: Multifunctional Tools

Chapter 1: Netcat and Cryptcat

Chapter 2: The X Window System

Chapter 3: Virtual Machines & Emulators

Part II: Tools for Auditing and Defending the Hosts

Chapter 4: Port Scanners

Chapter 5: Unix Enumeration Tools

Chapter 6: Windows Enumeration Tools

Chapter 7: Web Hacking Tools

Chapter 8: Password Cracking / Brute-Force Tools

Chapter 9: Host Hardening

Chapter 10: Backdoors and Remote Access Tools

Chapter 11: Simple Source Auditing Tools

Chapter 12: Combination System Auditing Tools

Part III: Tools for Auditing and Defending Your Network

Chapter 13: Firewalls

Chapter 14: Network Reconnaissance Tools

Chapter 15: Port Redirection

Chapter 16: Sniffers

Chapter 17: Wireless Tools

Chapter 18: War Dialers

Chapter 19: TCP/IP Stack Tools

Part IV: Tools for Computer Forensics and Incident Response

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Chapter 21: Commercial Forensic Image Tool Kits

Chapter 22: Open-Source Forensic Duplication Tool Kits

Chapter 23: Tool Kits to Aid in Forensic Analysis

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Chapter 25: Generalized Editors and Viewers

Part V: Appendixes

Appendix A: Useful Charts and Diagrams

Appendix B: Command-line Reference

Index

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 1889
無庫存,下單後進貨
(到貨天數約45天)

暢銷榜

客服中心

收藏

會員專區