Loading…

Hack I.T. : security through penetration testing /

"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Klevinsky, T. J.
Other Authors: Laliberte, Scott, Gupta, Ajay
Format: Electronic eBook
Language:Inglés
Published: Boston : Addison-Wesley, ©2002.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Hacking today
  • Defining the hacker
  • Penetration for hire
  • Where the exposures lie
  • Internet penetration
  • Dial-in penetration
  • Internal penetration testing
  • Social engineering
  • UNIX methods
  • The tool kit
  • Automated vulnerability scanners
  • Discovery tools
  • Port scanners
  • Sniffers
  • Password crackers
  • Windows NT tools
  • Web-testing tools
  • Remote control
  • Intrusion detection systems
  • Firewalls
  • Denial-of-service attacks
  • Wrapping it up
  • Future trends
  • Appendix A. CD-ROM contents
  • Appendix B. The twenty most critical Internet security vulnerabilities--the experts' consensus.