Security power tools
"Business objectives rely on the idea that people can find and use the services you provide. Designing Web Navigation gives you basic design principles, development techniques, and practical advice for creating effective navigation systems, with plenty of real-world examples. Well-researched an...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Sebastopol, Calif.
O'Reilly
2007
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Includes bibliographical references and index
- Part 1. Legal and ethics. Legal and ethics issues
- Part 2. Reconnaissance. Network scanning
- Vulnerability scanning
- LAN reconnaissance
- Wireless reconnaissance
- Custom packet generation
- Part 3. Penetration. Metasploit
- Wireless penetration
- Exploitation framework applications
- Custom exploitation
- Part 4. Control. Backdoors
- Rootkits
- Part 5. Defense. Proactive defense : firewalls
- Host hardening
- Securing communications
- Email security and anti-spam
- Device security testing
- Part 6. Monitoring. Network capture
- Network monitoring
- Host monitoring
- Part 7. Discovery. Forensics
- Application fuzzing
- Binary reverse engineering