Logo

Network Security Tools by Nitesh Dhanjani, Justin Clarke

Large book cover: Network Security Tools

Network Security Tools
by

Publisher: O'Reilly Media, Inc.
ISBN/ASIN: 0596007949
ISBN-13: 9780596007942
Number of pages: 340

Description:
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.

Download or read it online for free here:
Read online
(online reading)

Similar books

Book cover: Firewalls CompleteFirewalls Complete
by - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(11047 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(15021 views)
Book cover: Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(7532 views)
Book cover: Ethical HackingEthical Hacking

Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(5662 views)