Security power tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, an...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Beijing :
O'Reilly
2007.
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627439606719 |
Tabla de Contenidos:
- Part 1. Legal and ethics. Legal and ethics issues
- Part 2. Reconnaissance. Network scanning
- Vulnerability scanning
- LAN reconnaissance
- Wireless reconnaissance
- Custom packet generation
- Part 3. Penetration. Metasploit
- Wireless penetration
- Exploitation framework applications
- Custom exploitation
- Part 4. Control. Backdoors
- Rootkits
- Part 5. Defense. Proactive defense : firewalls
- Host hardening
- Securing communications
- Email security and anti-spam
- Device security testing
- Part 6. Monitoring. Network capture
- Network monitoring
- Host monitoring
- Part 7. Discovery. Forensics
- Application fuzzing
- Binary reverse engineering.