Anti-hacker tool kit:
"Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configur...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
McGraw-Hill Education
2014
|
Ausgabe: | Fourth edition / |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780071800143/?ar |
Zusammenfassung: | "Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: - Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options - Vulnerability scanners: OpenVAS, Metasploit - File system monitors: AIDE, Samhain, Tripwire - Windows auditing tools: Nbtstat, Cain, MBSA, PsTools - Command-line networking tools: Netcat, Cryptcat, Ncat, Socat - Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay - Port scanners: Nmap, THC-Amap - Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort - Network defenses: firewalls, packet filters, and intrusion detection systems - War dialers: ToneLoc, THC-Scan, WarVOX - Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap - Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra - Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion - Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR"-- |
Beschreibung: | Revision of: Anti-hacker tool kit / Mike Shema [and others]. -- 3rd ed. -- New York : McGraw-Hill/Osborne, ©2006. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxii, 601 Seiten) illustrations |
ISBN: | 9780071800150 0071800158 9780071800143 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047393505 | ||
003 | DE-627-1 | ||
005 | 20240228115607.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9780071800150 |c electronic bk. |9 978-0-07-180015-0 | ||
020 | |a 0071800158 |c electronic bk. |9 0-07-180015-8 | ||
020 | |a 9780071800143 |9 978-0-07-180014-3 | ||
035 | |a (DE-627-1)047393505 | ||
035 | |a (DE-599)KEP047393505 | ||
035 | |a (ORHE)9780071800143 | ||
035 | |a (DE-627-1)047393505 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Shema, Mike |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Anti-hacker tool kit |
250 | |a Fourth edition / | ||
264 | 1 | |a New York |b McGraw-Hill Education |c 2014 | |
300 | |a 1 Online-Ressource (xxii, 601 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Revision of: Anti-hacker tool kit / Mike Shema [and others]. -- 3rd ed. -- New York : McGraw-Hill/Osborne, ©2006. - Includes bibliographical references and index. - Print version record | ||
520 | |a "Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: - Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options - Vulnerability scanners: OpenVAS, Metasploit - File system monitors: AIDE, Samhain, Tripwire - Windows auditing tools: Nbtstat, Cain, MBSA, PsTools - Command-line networking tools: Netcat, Cryptcat, Ncat, Socat - Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay - Port scanners: Nmap, THC-Amap - Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort - Network defenses: firewalls, packet filters, and intrusion detection systems - War dialers: ToneLoc, THC-Scan, WarVOX - Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap - Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra - Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion - Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR"-- | ||
650 | 0 | |a Data protection | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Data protection | |
776 | 1 | |z 9780071800143 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780071800143 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780071800143/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047393505 |
---|---|
_version_ | 1821494912192872448 |
adam_text | |
any_adam_object | |
author | Shema, Mike |
author_facet | Shema, Mike |
author_role | aut |
author_sort | Shema, Mike |
author_variant | m s ms |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047393505 (DE-599)KEP047393505 (ORHE)9780071800143 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition / |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03344cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047393505</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115607.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071800150</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-07-180015-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071800158</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-07-180015-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071800143</subfield><subfield code="9">978-0-07-180014-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047393505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047393505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780071800143</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047393505</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shema, Mike</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Anti-hacker tool kit</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition /</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill Education</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 601 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Revision of: Anti-hacker tool kit / Mike Shema [and others]. -- 3rd ed. -- New York : McGraw-Hill/Osborne, ©2006. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: - Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options - Vulnerability scanners: OpenVAS, Metasploit - File system monitors: AIDE, Samhain, Tripwire - Windows auditing tools: Nbtstat, Cain, MBSA, PsTools - Command-line networking tools: Netcat, Cryptcat, Ncat, Socat - Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay - Port scanners: Nmap, THC-Amap - Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort - Network defenses: firewalls, packet filters, and intrusion detection systems - War dialers: ToneLoc, THC-Scan, WarVOX - Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap - Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra - Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion - Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780071800143</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780071800143</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780071800143/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047393505 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:55Z |
institution | BVB |
isbn | 9780071800150 0071800158 9780071800143 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxii, 601 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | McGraw-Hill Education |
record_format | marc |
spelling | Shema, Mike VerfasserIn aut Anti-hacker tool kit Fourth edition / New York McGraw-Hill Education 2014 1 Online-Ressource (xxii, 601 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Revision of: Anti-hacker tool kit / Mike Shema [and others]. -- 3rd ed. -- New York : McGraw-Hill/Osborne, ©2006. - Includes bibliographical references and index. - Print version record "Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: - Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options - Vulnerability scanners: OpenVAS, Metasploit - File system monitors: AIDE, Samhain, Tripwire - Windows auditing tools: Nbtstat, Cain, MBSA, PsTools - Command-line networking tools: Netcat, Cryptcat, Ncat, Socat - Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay - Port scanners: Nmap, THC-Amap - Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort - Network defenses: firewalls, packet filters, and intrusion detection systems - War dialers: ToneLoc, THC-Scan, WarVOX - Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap - Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra - Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion - Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR"-- Data protection Computer networks Security measures Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures 9780071800143 Erscheint auch als Druck-Ausgabe 9780071800143 |
spellingShingle | Shema, Mike Anti-hacker tool kit Data protection Computer networks Security measures Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Anti-hacker tool kit |
title_auth | Anti-hacker tool kit |
title_exact_search | Anti-hacker tool kit |
title_full | Anti-hacker tool kit |
title_fullStr | Anti-hacker tool kit |
title_full_unstemmed | Anti-hacker tool kit |
title_short | Anti-hacker tool kit |
title_sort | anti hacker tool kit |
topic | Data protection Computer networks Security measures Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Data protection Computer networks Security measures Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT shemamike antihackertoolkit |