Cargando…

Security power tools /

"Business objectives rely on the idea that people can find and use the services you provide. Designing Web Navigation gives you basic design principles, development techniques, and practical advice for creating effective navigation systems, with plenty of real-world examples. Well-researched an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Burns, Bryan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Part 1. Legal and ethics. Legal and ethics issues
  • Part 2. Reconnaissance. Network scanning
  • Vulnerability scanning
  • LAN reconnaissance
  • Wireless reconnaissance
  • Custom packet generation
  • Part 3. Penetration. Metasploit
  • Wireless penetration
  • Exploitation framework applications
  • Custom exploitation
  • Part 4. Control. Backdoors
  • Rootkits
  • Part 5. Defense. Proactive defense : firewalls
  • Host hardening
  • Securing communications
  • Email security and anti-spam
  • Device security testing
  • Part 6. Monitoring. Network capture
  • Network monitoring
  • Host monitoring
  • Part 7. Discovery. Forensics
  • Application fuzzing
  • Binary reverse engineering.