Security power tools

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, an...

Descripción completa

Detalles Bibliográficos
Autor principal: Burns, Bryan (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing : O'Reilly 2007.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627439606719
Tabla de Contenidos:
  • Part 1. Legal and ethics. Legal and ethics issues
  • Part 2. Reconnaissance. Network scanning
  • Vulnerability scanning
  • LAN reconnaissance
  • Wireless reconnaissance
  • Custom packet generation
  • Part 3. Penetration. Metasploit
  • Wireless penetration
  • Exploitation framework applications
  • Custom exploitation
  • Part 4. Control. Backdoors
  • Rootkits
  • Part 5. Defense. Proactive defense : firewalls
  • Host hardening
  • Securing communications
  • Email security and anti-spam
  • Device security testing
  • Part 6. Monitoring. Network capture
  • Network monitoring
  • Host monitoring
  • Part 7. Discovery. Forensics
  • Application fuzzing
  • Binary reverse engineering.