Cargando…

Network security tools /

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the informati...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Clarke, Justin
Otros Autores: Dhanjani, Nitesh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Safari Tech Books Online, 2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocm68178261
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 051012s2005 caua fo 001 0 eng d
040 |a MNU  |b eng  |e pn  |c MNU  |d OCLCQ  |d CEF  |d OCLCQ  |d MBB  |d OCLCQ  |d TEFOD  |d OCLCF  |d N$T  |d OCLCQ  |d YDXCP  |d TEFOD  |d EBLCP  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 922907270 
020 |a 9781491947425  |q (electronic bk.) 
020 |a 149194742X  |q (electronic bk.) 
020 |a 9781491947418  |q (electronic bk.) 
020 |a 1491947411  |q (electronic bk.) 
020 |z 0596007949 
020 |z 9780596007942 
029 1 |a AU@  |b 000071511452 
035 |a (OCoLC)68178261  |z (OCoLC)922907270 
037 |a 565B0DEB-A33D-4B08-89AF-D6C1D213CD2B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b D523 2005 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.478  |2 22 
049 |a UAMI 
100 1 |a Clarke, Justin. 
245 1 0 |a Network security tools /  |c by Justin Clarke, Nitesh Dhanjani. 
260 |a Boston, MA :  |b Safari Tech Books Online,  |c 2005. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from e-book home page (viewed Jan. 25, 2006). 
500 |a Print version has edition statement: 1st ed. 
500 |a Includes index and errata. 
505 0 0 |g pt. I.  |t Modifying and hacking security tools --  |g 1.  |t Writing plug-ins for Nessus --  |g 2.  |t Developing dissectors and plug-ins for the Ettercap network sniffer --  |g 3.  |t Extending Hydra and Nmap --  |g 4.  |t Writing plug-ins for the Nikto vulnerability scanner --  |g 5.  |t Writing modules for the Metasploit framework --  |g 6.  |t Extending code analysis to the Webroot --  |g pt. II.  |t Writing network security tools --  |g 7.  |t Fun with Linux kernel modules --  |g 8.  |t Developing web assessment tools and scripts --  |g 9.  |t Automated exploit tools --  |g 10.  |t Writing network sniffers --  |g 11.  |t Writing packet-injection tools. 
520 |a If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Dhanjani, Nitesh. 
776 0 8 |i Print version:  |a Dhanjani, Nitesh.  |t Network Security Tools : Writing, Hacking, and Modifying Security Tools.  |d Sebastopol : O'Reilly Media, ©2005  |z 9780596007942 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596007949/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1498566 
938 |a EBSCOhost  |b EBSC  |n 655458 
938 |a YBP Library Services  |b YANK  |n 11323949 
938 |a YBP Library Services  |b YANK  |n 11310657 
994 |a 92  |b IZTAP