My Account Details

ISBN10: 007180014X | ISBN13: 9780071800143

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
1Netcat & Cryptcat
2Windows
3VMs & Emulators
Part 2 Tools for Auditing & Defending Hosts
4Port Scanners
5Unix Enumeration
6Windows Tools
7Web Hacking
8Password & Brute Force
9Host Hardening
10Backdoors & Remote Acess
11Simple Source Auditing Tools
12Combination Systems Auditing
Part 3 Tools for Auditing & Defending Your Network
13Firewalls
14Network Reconnaissance
15Port Redirects
16Sniffers
17Wireless Tools
18War Dialers
19TCP/IP Stacks
Part 4 Tools for Computer Forensics & Incident Response
20Creating a Bootable Environment
21Commercial Forensic Imaging
22Open-Source Forensic Duping
23Analysis Toolkits
24Internet Activity Reconstruction
25Editors and Viewers
Need support? We're here to help - Get real-world support and resources every step of the way.