HOME > 상세정보

상세정보

Anti-hacker tool kit 3rd ed

Anti-hacker tool kit 3rd ed (2회 대출)

자료유형
단행본
개인저자
Shema, Mike.
서명 / 저자사항
Anti-hacker tool kit / Mike Shema ... [et al.].
판사항
3rd ed.
발행사항
New York :   McGraw-Hill/Osborne ,   c2006.  
형태사항
xxvi, 799 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).
ISBN
0072262877 9780772262872
일반주기
Includes index.  
일반주제명
Data protection. Computer networks -- Security measures.
000 00780camuu2200241 a 4500
001 000045404747
005 20080313134221
008 060331s2006 nyua 001 0 eng d
020 ▼a 0072262877
020 ▼a 9780772262872
035 ▼a (KERIS)BIB000010328790
040 ▼a IKG ▼c IKG ▼d BAKER ▼d 222001 ▼d 244002 ▼d 211009
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A629-3
245 0 0 ▼a Anti-hacker tool kit / ▼c Mike Shema ... [et al.].
250 ▼a 3rd ed.
260 ▼a New York : ▼b McGraw-Hill/Osborne , ▼c c2006.
300 ▼a xxvi, 799 p. : ▼b ill. ; ▼c 24 cm. + ▼e 1 CD-ROM (4 3/4 in.).
500 ▼a Includes index.
650 0 ▼a Data protection.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Shema, Mike.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A629-3 등록번호 121166047 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 A629-3 등록번호 151244355 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A629-3 등록번호 121166047 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 A629-3 등록번호 151244355 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

Stop hackers in their tracks

Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

  • Completely revised to include the latest security tools, including wireless tools
  • New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
  • New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
  • New case studies in each chapter


정보제공 : Aladin

목차

Acknowledgments

Introduction

Part I: Multifunctional Tools

Chapter 1: Netcat and Cryptcat

Chapter 2: The X Window System

Chapter 3: Virtual Machines & Emulators

Part II: Tools for Auditing and Defending the Hosts

Chapter 4: Port Scanners

Chapter 5: Unix Enumeration Tools

Chapter 6: Windows Enumeration Tools

Chapter 7: Web Hacking Tools

Chapter 8: Password Cracking / Brute-Force Tools

Chapter 9: Host Hardening

Chapter 10: Backdoors and Remote Access Tools

Chapter 11: Simple Source Auditing Tools

Chapter 12: Combination System Auditing Tools

Part III: Tools for Auditing and Defending Your Network

Chapter 13: Firewalls

Chapter 14: Network Reconnaissance Tools

Chapter 15: Port Redirection

Chapter 16: Sniffers

Chapter 17: Wireless Tools

Chapter 18: War Dialers

Chapter 19: TCP/IP Stack Tools

Part IV: Tools for Computer Forensics and Incident Response

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Chapter 21: Commercial Forensic Image Tool Kits

Chapter 22: Open-Source Forensic Duplication Tool Kits

Chapter 23: Tool Kits to Aid in Forensic Analysis

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Chapter 25: Generalized Editors and Viewers

Part V: Appendixes

Appendix A: Useful Charts and Diagrams

Appendix B: Command-line Reference

Index


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)