Get in–depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.
"synopsis" may belong to another edition of this title.
"This book continues the best-selling tradition of Hacking Exposed--only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit." -- Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications
Stay one step ahead of even the most cunning hackers with help from this invaluable resource. Through proper use and configuration of key security tools, you'll be able to investigate and resolve existing problems within your network infrastructure with precision and a minimum of fuss. Written by experienced security professionals, this resource provides you with comprehensive coverage of the most important and up-to-date security tools in use today, explains their function, and shows you how to use each tool effectively through in-depth implementation examples and case studies. Learn to detect and prevent system misconfigurations and Web server hacks plus, discover best practices for protecting both large and small networks.
Includes best practices for use and configuration of these key tools:
Keith J. Jones is a contributing author of Hacker's Challenge (Osborne). He is a computer forensic consultant for Foundstone, one of the top security firms. His primary area of concentration is incident response program development and computer forensics. Jones specializes in log analysis, computer crime investigations, forensic tool analysis and specialized attack and penetration testing. At Foundstone, Jones has investigated several different types of cases including intellectual property theft, financial embezzlement, negligence, and external attacks. Bradley C. Johnson is currently the manager of the Network and Security.Group at Viaken Systems, a biotech IT provider. Johnson is responsible for the security and functionality of both Viaken's internal network as well as its customers' networks. He has a great deal of experience with tools used to protect and monitor computer networks, such as firewalls, intrusion detection systems, vulnerability and port scanners, network-wide system monitors, and log archival tools.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Osborne Media, 2002. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX0072222824
Book Description McGraw-Hill Osborne Media, 2002. Paperback. Book Condition: New. book. Bookseller Inventory # 0072222824
Book Description McGraw-Hill Osborne Media, 2002. Paperback. Book Condition: New. Bookseller Inventory # P110072222824
Book Description McGraw-Hill Osborne Media. PAPERBACK. Book Condition: New. 0072222824 New Condition. Bookseller Inventory # NEW6.3013464
Book Description Blacklick, Ohio, U.S.A.: McGraw-Hill Osborne Media, 2002. Soft cover. Book Condition: New. Brand new book - no defects.-.-. Bookseller Inventory # ABE-1141902901