Hack I.T. : security through penetration testing /
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boston :
Addison-Wesley,
©2002.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Hacking today
- Defining the hacker
- Penetration for hire
- Where the exposures lie
- Internet penetration
- Dial-in penetration
- Internal penetration testing
- Social engineering
- UNIX methods
- The tool kit
- Automated vulnerability scanners
- Discovery tools
- Port scanners
- Sniffers
- Password crackers
- Windows NT tools
- Web-testing tools
- Remote control
- Intrusion detection systems
- Firewalls
- Denial-of-service attacks
- Wrapping it up
- Future trends
- Appendix A. CD-ROM contents
- Appendix B. The twenty most critical Internet security vulnerabilities--the experts' consensus.