Security power tools

"Business objectives rely on the idea that people can find and use the services you provide. Designing Web Navigation gives you basic design principles, development techniques, and practical advice for creating effective navigation systems, with plenty of real-world examples. Well-researched an...

Full description

Bibliographic Details
Main Author: Burns, Bryan
Format: eBook
Language:English
Published: Sebastopol, Calif. O'Reilly 2007
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Includes bibliographical references and index
  • Part 1. Legal and ethics. Legal and ethics issues
  • Part 2. Reconnaissance. Network scanning
  • Vulnerability scanning
  • LAN reconnaissance
  • Wireless reconnaissance
  • Custom packet generation
  • Part 3. Penetration. Metasploit
  • Wireless penetration
  • Exploitation framework applications
  • Custom exploitation
  • Part 4. Control. Backdoors
  • Rootkits
  • Part 5. Defense. Proactive defense : firewalls
  • Host hardening
  • Securing communications
  • Email security and anti-spam
  • Device security testing
  • Part 6. Monitoring. Network capture
  • Network monitoring
  • Host monitoring
  • Part 7. Discovery. Forensics
  • Application fuzzing
  • Binary reverse engineering