The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security. * Covers all core areas of network security and how they interrelate * Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide * Examines new trends and best practices in use by organizations to secure their enterprises * Features additional chapters on areas related to data protection/correlation and forensics * Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know. From the Back Cover Complements your Cisco Academy course instruction in networking security! Network Security Bible Second Edition Eric Cole Understand the changing security landscape Learn the latest approaches and best practices Secure your enterprise and data worldwide The book you need to succeed! If you're in charge of network security, you need this book Since the first edition of this comprehensive guide, cyber threats have increased, the stakes have gotten higher, and what is considered state of the art security has evolved. This packed new edition, thoroughly revised to cover the very latest techniques, is the detailed wall-to-wall resource you need to keep your network secure. Understand the changing threats, find out what defense in depth means and why you need it, learn best practices, and take control with this must-have book. * Understand current threats and attacks and how they succeed * Answer 30 critical questions and see how your network security is today * Consider mission resilience and make sure your critical functions survive * Master crypto, steganography, VPN, and other covert communications * Learn effective techniques for Windows®, Linux®, browser, e-mail, and wireless security * Explore the basics of digital forensics, including evidence preservation * Do risk analysis, make a global plan, and prepare for business continuity and recovery
* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking * Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits * The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits * New wireless and RFID security tools, including multilayered encryption and gateways * All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices * Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage * VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking * Fully updated chapters on hacking the Internet user, web hacking, and securing code
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the information you'll need to lock down your network from the ground up. Logically organized by category, each tool's function, installation, and configuration is fully described, alongside screenshots and code examples. Brand-new examples and in-depth case studies detail how to implement each vital tool in real-world situations. Explains how to configure and use these and other key tools: * MULTIFUNCTIONAL UTILITIES: Netcat, Cryptcat, Sbd * PORT SCANNERS: Nmap, THC-Amap,IPEye * EMULATORS: VMware, Virtual PC, Gnoppix, Cygwin * ENUMERATORS: Samba, Winfingerprint, PsTools, HFNetChk * WEB HACKING APPLICATIONS: Nikto, LibWhisker, Paros, Burp * PASSWORD CRACKERS AND BRUTE-FORCE TOOLS: John the Ripper, LophtCrack, THC-Hydra, PwDump * WAR DIALERS: ToneLoc, THC-Scan * HOST HARDENING APPLICATIONS: Clamav, Titan, Msec * BACKDOORS AND REMOTE ACCESS: VNC, Netbus, Back Orifice, SubSeven, Loki, Knark * AUDITING TOOLS: Flawfinder, RATS, Nessus, STAT, Tripwire * PORT REDIRECTERS: Datapipe, FPipe, WinRelay * SNIFFERS: BUTTSniffer, WinDump, Ethereal, Dsniff, Snort * WIRELESS TOOLS: NetSlumber, TCPsic, ICMpsic, Iptest * FORENSIC UTILITIES: dd, EnCase, Sleuth Kit, Vnode, WinHex