Oblasti, naše knjige
Oblasti, drugi izdavači
Zaštita i sigurnost
Autor: Michael Gregg
Broj strana: 480
Godina izdanja: 2015.
Pregleda (30 dana / ukupno): 23 / 971
The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills.
Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers.
The Network Security Test Lab is your complete, essential guide.
Chapter 1 Building a Hardware and Software Test Platform 1
Chapter 2 Passive Information Gathering 39
Chapter 3 Analyzing Network Traffic 77
Chapter 4 Detecting Live Systems and Analyzing Results 125
Chapter 5 Enumerating Systems 181
Chapter 6 Automating Encryption and Tunneling Techniques 231
Chapter 7 Automated Attack and Penetration Tools 273
Chapter 8 Securing Wireless Systems 299
Chapter 9 An Introduction to Malware 331
Chapter 10 Detecting Intrusions and Analyzing Malware 365
Chapter 11 Forensic Detection 403
|ReadMe||397 bytes||Click to Download|
|Full Code Download||82.17 KB||Click to Download|
|Chapter 3 ARP Poisoning||9.66 KB||Click to Download|
|Chapter 4 ftp||3.99 KB||Click to Download|
|Chapter 4 idle scan||281.14 KB||Click to Download|
|Chapter 5 ripv_1||2.59 KB||Click to Download|
|Chapter 5 SCADA||9.94 KB||Click to Download|
|Chapter 6 smtp||18.44 KB||Click to Download|
Glas za prevod!
Ostavite komentar, svakoga dana ćemo nekoga nagraditi.
This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.