Home | Amazing | Today | Tags | Publishers | Years | Search 
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
One of the most attractive attributes of Nessus is the simplicity of creating custom extensions (or
plugins) to be run with the Nessus engine.This benefit is gained via the specialized language
NASL (Nessus Attack Scripting Language). NASL supplies the infrastructure to write networkbased
scripts without the need to implement the
...
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

The term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them....

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Microsoft Log Parser Toolkit
Microsoft Log Parser Toolkit
Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you...
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Configuring Check Point NGX VPN-1/Firewall-1
Configuring Check Point NGX VPN-1/Firewall-1
Check Point FireWall-1 came out in 1994 and was an immediate success. It has been
the market-leading firewall platform for over 10 years. It is no wonder the platform
has done so well.The Check Point Graphical User Interface for managing firewall
policies is extremely intuitive and easy to learn.

Check Point has come a
...
Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools

A Toolkit for IT Professionals

Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up...

Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Virtualization with VMware ESX Server
Virtualization with VMware ESX Server

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...

Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy