| 000 | 00780camuu2200241 a 4500 | |
| 001 | 000045404747 | |
| 005 | 20080313134221 | |
| 008 | 060331s2006 nyua 001 0 eng d | |
| 020 | ▼a 0072262877 | |
| 020 | ▼a 9780772262872 | |
| 035 | ▼a (KERIS)BIB000010328790 | |
| 040 | ▼a IKG ▼c IKG ▼d BAKER ▼d 222001 ▼d 244002 ▼d 211009 | |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b A629-3 | |
| 245 | 0 0 | ▼a Anti-hacker tool kit / ▼c Mike Shema ... [et al.]. |
| 250 | ▼a 3rd ed. | |
| 260 | ▼a New York : ▼b McGraw-Hill/Osborne , ▼c c2006. | |
| 300 | ▼a xxvi, 799 p. : ▼b ill. ; ▼c 24 cm. + ▼e 1 CD-ROM (4 3/4 in.). | |
| 500 | ▼a Includes index. | |
| 650 | 0 | ▼a Data protection. |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 700 | 1 | ▼a Shema, Mike. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A629-3 | 등록번호 121166047 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 A629-3 | 등록번호 151244355 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A629-3 | 등록번호 121166047 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 A629-3 | 등록번호 151244355 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Stop hackers in their tracks
Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.
- Completely revised to include the latest security tools, including wireless tools
- New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
- New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
- New case studies in each chapter
정보제공 :
목차
Acknowledgments
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
Chapter 2: The X Window System
Chapter 3: Virtual Machines & Emulators
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
Chapter 5: Unix Enumeration Tools
Chapter 6: Windows Enumeration Tools
Chapter 7: Web Hacking Tools
Chapter 8: Password Cracking / Brute-Force Tools
Chapter 9: Host Hardening
Chapter 10: Backdoors and Remote Access Tools
Chapter 11: Simple Source Auditing Tools
Chapter 12: Combination System Auditing Tools
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
Chapter 14: Network Reconnaissance Tools
Chapter 15: Port Redirection
Chapter 16: Sniffers
Chapter 17: Wireless Tools
Chapter 18: War Dialers
Chapter 19: TCP/IP Stack Tools
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Chapter 21: Commercial Forensic Image Tool Kits
Chapter 22: Open-Source Forensic Duplication Tool Kits
Chapter 23: Tool Kits to Aid in Forensic Analysis
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Chapter 25: Generalized Editors and Viewers
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
Appendix B: Command-line Reference
Index
정보제공 :
