当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Security Power Tools

Security Power Tools

书名:Security Power Tools

上传:石头

时间:2009-12-20

文件大小:8.65 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Bryan Burns, Jennifer Granick, Steve Manzuik, PaulGuersch, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier,Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi
出版日期:August 27, 2007
出版社:O'Reilly
页数:856
ISBN:ISBN-10: 0596009631 ISBN-13: 978-0596009632
文件格式:PDF

What if you could sit down with some of the most talented securityengineers in the world and ask any network security question youwanted? Security Power Tools lets you do exactly that! Members ofJuniper Networks’ Security Engineering team and a few guest expertsreveal how to use, tweak, and push the most popular network securityapplications, utilities, and tools available using Windows, Linux, MacOS X, and Unix platforms. Designed to be browsed, Security Power Toolsoffers you multiple approaches to network security via 23cross-referenced chapters that review the best security tools on theplanet for both black hat techniques and white hat defense tactics.It’s a must-have reference for network administrators, engineers andconsultants with tips, tricks, and how-to advice for an assortment offreeware and commercial tools, ranging from intermediate levelcommand-line operations to advanced programming of self-hidingexploits. Security Power Tools details best practices for:Reconnaissance — including tools for network scanning such as nmap;vulnerability scanning tools for Windows and Linux; LAN reconnaissance;tools to help with wireless reconnaissance; and custom packetgeneration Penetration — such as the Metasploit framework for automatedpenetration of remote computers; tools to find wireless networks;exploitation framework applications; and tricks and tools to manipulateshellcodes Control — including the configuration of several tools foruse as backdoors; and a review of known rootkits for Windows and LinuxDefense — including host-based firewalls; host hardening for Windowsand Linux networks; communication security with ssh; email security andanti-malware; anddevice security testing Monitoring — such as tools tocapture, and analyze packets; network monitoring with Honeyd and snort;and host monitoring of production servers for file changes Discovery —including The Forensic Toolkit, SysInternals and other popular forensictools; application fuzzer and fuzzing techniques; and the art of binaryreverse engineering using tools like Interactive Disassembler andOllydbg A practical and timely network security ethics chapter writtenby a Stanford University professor of law completes the suite of topicsand makes this book a goldmine of security information. Save yourself aton of headaches and be prepared for any network security dilemma withSecurity Power Tools.
About the Author
Bryan Burns is the technical editor and general project leader of thisbook. He is the Chief Security Architect for Juniper Networks with morethan a decade of experience in the security networking field and withnumerous posts at leading network security companies. All othercontributors are security engineers and researchers working at JuniperNetworks in various posts both in the security network lab and in thefield.
Steve Manzuik has more than 13 thirteen years of experience in theinformation technology and security industry. Steve founded and was thetechnical lead for Entrench Technologies. Prior to Entrench, Mr.Manzuik was a manager in Ernst & Young’s Security & TechnologySolutions practice. Steve co-authored Hack Proofing Your Network,Second Edition (Syngress, 1928994709).
Dave Killion (NSCA, NSCP) is a senior security research engineerwith Juniper Networks, Inc. Formerly with the U.S. Army’s InformationOperations Task Force as an Information Warfare Specialist, hecurrently researches, develops, and releases signatures for theNetScreen Deep Inspection and Intrusion Detection and Preventionplatforms. Dave has also presented at several security conventionsincluding DefCon and ToorCon, with a proof-of-concept networkmonitoring evasion device in affiliation with several local securityinterest groups that he helped form. Dave lives south of Silicon Valleywith his wife Dawn and two children, Rebecca and Justin.
Tags:PowerSecurityTools


相关书籍

  • Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
  • Security in Wireless Mesh Networks (PDF英文版)
  • Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
  • Managing the Human Factor in Information Security: How to win over staff and inf
  • Security in Wireless Mesh Networks (PDF英文版)

评论 (0) All

登陆 | 还没注册?