Normal view MARC view ISBD view

Hack attacks testing : how to conduct your own security audit / John Chirillo

By: Chirillo, John, 1970-.
Publisher: New York : Wiley, c2003Description: xvi, 540 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).ISBN: 0471229466 (pbk.).Subject(s): Hackers | Computer securityDDC classification: 005.8
Contents:
Acknowledgments. - Introduction. - Pt. 1. Building a multisystem tiger box. Ch. 1. Basic windows 2000 / windows 2000 server installation and configuration. Ch. 2. Basic linux and solaris installation and configurations. Ch. 3. Mac OS X tiger box solutions. Ch. 4. Installing and configuring a testing target. - Pt. 2. Using security analysis tools for your windows-based tiger box operating system. Ch 5. Cerberus internet scanner. Ch. 6. CyberCop scanner. Ch. 7. Internet scanner. Ch. 8. Security threat avoidance technology scanner. Ch. 9. TigerSuite 4.0. - Pt. 3. Using security analysis tools for *NIX and Mac OS X. Ch. 10. hping/2. Ch. 11. Nessus security scanner. Ch. 12. Nmap. Ch. 13. SAINT. C. 14. SARA. - Pt. 4. Vulnerability assessment. Ch. 15. Comparative analysis. - Appendix A. Linus / Unix shorcuts and commands. - Appendix B. What's on the CD-ROM. - Index.
Item type Current location Call number Vol info Copy number Status Notes Date due Barcode Remark
Accompanying Material (Media Resource) TU External Storage-LCS
005.8 CHI (Browse shelf) CD-ROM 1 Available SOCIT,15009,03,GR 1000117713 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Includes index.

Acknowledgments. - Introduction. - Pt. 1. Building a multisystem tiger box. Ch. 1. Basic windows 2000 / windows 2000 server installation and configuration. Ch. 2. Basic linux and solaris installation and configurations. Ch. 3. Mac OS X tiger box solutions. Ch. 4. Installing and configuring a testing target. - Pt. 2. Using security analysis tools for your windows-based tiger box operating system. Ch 5. Cerberus internet scanner. Ch. 6. CyberCop scanner. Ch. 7. Internet scanner. Ch. 8. Security threat avoidance technology scanner. Ch. 9. TigerSuite 4.0. - Pt. 3. Using security analysis tools for *NIX and Mac OS X. Ch. 10. hping/2. Ch. 11. Nessus security scanner. Ch. 12. Nmap. Ch. 13. SAINT. C. 14. SARA. - Pt. 4. Vulnerability assessment. Ch. 15. Comparative analysis. - Appendix A. Linus / Unix shorcuts and commands. - Appendix B. What's on the CD-ROM. - Index.