Logo

Network Security Tools by Nitesh Dhanjani, Justin Clarke

Large book cover: Network Security Tools

Network Security Tools
by

Publisher: O'Reilly Media, Inc.
ISBN/ASIN: 0596007949
ISBN-13: 9780596007942
Number of pages: 340

Description:
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.

Download or read it online for free here:
Read online
(online reading)

Similar books

Book cover: Understanding OSIUnderstanding OSI
by - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(16269 views)
Book cover: OpenSSHOpenSSH
- Wikibooks
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(6039 views)
Book cover: Snort CookbookSnort Cookbook
by - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(8076 views)
Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(8641 views)