Media type: Book Title: Security power tools Contains: Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering Contributor: Burns, Bryan [Other] imprint: Beijing; Köln [u.a.]: O'Reilly, 2007 Issue: 1. ed. Extent: XXXII, 822 S.; Ill Language: English ISBN: 0596009631; 9780596009632 RVK notation: ST 277 : Sonstiges zur Sicherheit in der Datenverarbeitung Keywords: Computersicherheit Origination: Footnote:
Departmental Library DrePunct – stack Shelf-mark: R2017 8 15928 Item ID: 31837421 Status: Loanable, place order > Ordering possible ‒ please log in Delivery expected: 1 - 2 days after order