Skip to contents

  1. Kanclirz, Jan [Editor]

    Netcat power tools : [look past its deceptive simplicity to master the power of Netcat! ; maintain a foothold on an exploited system with Netcat during penetration testing ; use Netcat in both command and data channels to troubleshoot your network ; integrate Netcat with other tools for complete network enumeration and scanning]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress Publ., 2008

  2. Büschkes, Roland [Editor] ; Gesellschaft für Informatik Fachgruppe Erkennung und Beherrschung von Vorfällen der Informationssicherheit, DIMVA 3 2006 Berlin

    Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13 - 14, 2006 ; proceedings

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2006

    Published in: Lecture notes in computer science ; 4064

  3. Alder, Raven [Other]

    How to cheat at configuring Open Source security tools : [the perfect reference for the multitasked sysadmin ; discover why "measure twice, cut once" applies to configuring Open Source tools ; learn how to use flexible tools like Snort, Wireshark, NetFlow, Nmap, SmoothWall, and Oinkmaster ; examples included for Windows, Linux, and OS X systems]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Rockland, Mass [u.a.]: Syngress, 2007

    Published in: 4 free e-booklets