Hack I.T. : security through penetration testing /
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Boston :
Addison-Wesley,
©2002.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Hacking today
- Defining the hacker
- Penetration for hire
- Where the exposures lie
- Internet penetration
- Dial-in penetration
- Internal penetration testing
- Social engineering
- UNIX methods
- The tool kit
- Automated vulnerability scanners
- Discovery tools
- Port scanners
- Sniffers
- Password crackers
- Windows NT tools
- Web-testing tools
- Remote control
- Intrusion detection systems
- Firewalls
- Denial-of-service attacks
- Wrapping it up
- Future trends
- Appendix A. CD-ROM contents
- Appendix B. The twenty most critical Internet security vulnerabilities--the experts' consensus.