|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Netzwerksicherheitstools (Taschenbuch oder Softback)

Bargain Book Stores
(1134094)
Angemeldet als gewerblicher Verkäufer
US $41,18
Ca.CHF 32,75
Artikelzustand:
Neu
5 verfügbar
Ganz entspannt. Kostenloser Versand & Rückversand.
Versand:
Kostenlos Standard Shipping.
Standort: Grand Rapids, Michigan, USA
Lieferung:
Lieferung zwischen Mo, 4. Aug und Sa, 9. Aug nach 94104 bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:388542406899
Zuletzt aktualisiert am 18. Jul. 2025 23:18:41 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
UPC
00636920007944
EAN
9780596007942
ISBN
0596007949
Manufacturer
O'Reilly Media
Brand
O'Reilly Media
Binding
TP
Book Title
Network Security Tools

Über dieses Produkt

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
0596007949
ISBN-13
9780596007942
eBay Product ID (ePID)
45028673

Product Key Features

Number of Pages
340 Pages
Publication Name
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Language
English
Publication Year
2005
Subject
Security / Online Safety & Privacy, Security / General, Security / Networking, Networking / Local Area Networks (Lans)
Type
Textbook
Author
Justin Clarke, Nitesh Dhanjani
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.7 in
Item Weight
21.3 Oz
Item Length
9.1 in
Item Width
7.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2005-283565
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari Enabled; Acknowledgments;Modifying and Hacking Security Tools; Chapter 1: Writing Plug-ins for Nessus; 1.1 The Nessus Architecture; 1.2 Installing Nessus; 1.3 Using Nessus; 1.4 The NASL Interpreter; 1.5 Hello World; 1.6 Datatypes and Variables; 1.7 Operators; 1.8 if...else; 1.9 Loops; 1.10 Functions; 1.11 Predefined Global Variables; 1.12 Important NASL Functions; 1.13 Nessus Plug-ins; Chapter 2: Developing Dissectors and Plug-ins for the Ettercap Network Sniffer; 2.1 Installing and Using Ettercap; 2.2 Writing an Ettercap Dissector; 2.3 Writing an Ettercap Plug-in; Chapter 3: Extending Hydra and Nmap; 3.1 Extending Hydra; 3.2 Adding Service Signatures to Nmap; Chapter 4: Writing Plug-ins for the Nikto Vulnerability Scanner; 4.1 Installing Nikto; 4.2 Using Nikto; 4.3 Nikto Under the Hood; 4.4 Existing Nikto Plug-ins; 4.5 Adding Custom Entries to the Plug-in Databases; 4.6 Using LibWhisker; 4.7 Writing an NTLM Plug-in for Brute-Force Testing; 4.8 Writing a Standalone Plug-in to Attack Lotus Domino; Chapter 5: Writing Modules for the Metasploit Framework; 5.1 Introduction to MSF; 5.2 Overview of Stack Buffer Overflows; 5.3 Writing Exploits for MSF; 5.4 Writing a Module for the MnoGoSearch Overflow; 5.5 Writing an Operating System Fingerprinting Module for MSF; Chapter 6: Extending Code Analysis to the Webroot; 6.1 Attacking Web Applications at the Source; 6.2 Toolkit 101; 6.3 PMD; 6.4 Extending PMD;Modifying and Hacking Security Tools; Chapter 7: Fun with Linux Kernel Modules; 7.1 Hello World; 7.2 Intercepting System Calls; 7.3 Hiding Processes; 7.4 Hiding from netstat; Chapter 8: Developing Web Assessment Tools and Scripts; 8.1 Web Application Environment; 8.2 Designing the Scanner; 8.3 Building the Log Parser; 8.4 Building the Scanner; 8.5 Using the Scanner; 8.6 Complete Source Code; Chapter 9: Automated Exploit Tools; 9.1 SQL Injection Exploits; 9.2 The Exploit Scanner; 9.3 Using the Scanner; Chapter 10: Writing Network Sniffers; 10.1 Introduction to libpcap; 10.2 Getting Started with libpcap; 10.3 libpcap and 802.11 Wireless Networks; 10.4 libpcap and Perl; 10.5 libpcap Library Reference; Chapter 11: Writing Packet-Injection Tools; 11.1 Introduction to libnet; 11.2 Getting Started with libnet; 11.3 Advanced libnet Functions; 11.4 Combining libnet and libpcap; 11.5 Introducing AirJack;Colophon;
Synopsis
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network., While most books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you ......, If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function. Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network., If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. "Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function. Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, "Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practicalsolutions--without reinventing the wheel. In an age when security is critical, "Network Security Tools is the resource you want at your side when locking down your network.
LC Classification Number
TK5105.59

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

Bargain Book Stores

99,2% positive Bewertungen3.2 Mio. Artikel verkauft

Mitglied seit Feb 2002
Angemeldet als gewerblicher Verkäufer
BargainBookStores - Your Source for New Bargains - Save Up to 90% Everyday! We offer super low prices on thousands of items, books and media.
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
5.0
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
4.9

Verkäuferbewertungen (1'268'172)

Alle Bewertungen
Positiv
Neutral
Negativ