Hack attacks testing : how to conduct your own security audit / John Chirillo
By: Chirillo, John.
Publisher: New York : Wiley, c2003Description: xvi, 540 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).ISBN: 0471229466 (pbk.).Subject(s): Hackers | Computer securityDDC classification: 005.8Item type | Current location | Call number | Vol info | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|---|
Accompanying Material (Media Resource) | TU External Storage-LCS | 005.8 CHI (Browse shelf) | CD-ROM | 1 | Available | SOCIT,15009,03,GR | 1000117713 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 |
Includes index.
Acknowledgments. - Introduction. - Pt. 1. Building a multisystem tiger box. Ch. 1. Basic windows 2000 / windows 2000 server installation and configuration. Ch. 2. Basic linux and solaris installation and configurations. Ch. 3. Mac OS X tiger box solutions. Ch. 4. Installing and configuring a testing target. - Pt. 2. Using security analysis tools for your windows-based tiger box operating system. Ch 5. Cerberus internet scanner. Ch. 6. CyberCop scanner. Ch. 7. Internet scanner. Ch. 8. Security threat avoidance technology scanner. Ch. 9. TigerSuite 4.0. - Pt. 3. Using security analysis tools for *NIX and Mac OS X. Ch. 10. hping/2. Ch. 11. Nessus security scanner. Ch. 12. Nmap. Ch. 13. SAINT. C. 14. SARA. - Pt. 4. Vulnerability assessment. Ch. 15. Comparative analysis. - Appendix A. Linus / Unix shorcuts and commands. - Appendix B. What's on the CD-ROM. - Index.