Angebote zu "Nmap" (5 Treffer)

Kategorien

Shops

Nmap kompakt (eBook, ePUB)
9,99 € *
ggf. zzgl. Versand

Fast täglich kann man den Medien Berichte über erfolgreiche Hacker-Angriffe entnehmen. Will man sich nicht in die Reihe der renommierten Opfer einreihen, muss man seine IT-Infrastruktur auf mögliche Angriffspunkte und Schwachstellen prüfen - am besten kontinuierlich. Alles, was Sie dazu benötigen, sind Tools, die mögliche Angriffspunkte identifizieren. Mit Nmap steht Ihnen ein Klassiker zur Verfügung, der in jeden Admin-Werkzeugkasten gehört. Nmap (Network Mapper) ist von Haus aus ein Werkzeug für die Ermittlung von Netzwerkkomponenten und Diensten. Das Programm unterstützt Administratoren bei der Inventarisierung, dem Verwalten von Diensten sowie dem Monitoring von Services und Hosts. Das Tool kann aber nicht nur verschiedenste Informationen von den gefundenen Hosts ermitteln, sondern auch Schwachstellen von wichtigen Infrastrukturkomponenten aufdecken. In diesem Einstieg lernen Sie die wichtigsten Möglichkeiten von Nmap anhand praxisorientierter Beispiele kennen. Dr. Holger Reibold (reibold.de) studierte Informatik, promovierte und begann in den 1990ern seine Karriere als Fachjournalist und Autor. 1995 veröffentlichte das Urgestein unter den Internet- und IT-Journalisten das erste Buch zum Thema World Wide Web. Es folgten Hunderte Artikel in Fachzeitschriften wie Android User, Cobbs Inside, Computer Bild, DOS, Dr. Web, Internet Magazin, Internet Pro, IT-Administrator, Net-Investor, PC Magazin, PC Pro, Linux Intern, Linux Magazin, Open Source Magazin, TecChannel, Weka etc. und sowie über Hundert Bestseller mit einer Gesamtauflage von mehreren Hunderttausend rund um die Themen Internet und Open Source. 2005 gründete Reibold den Verlag Brain-Media.de.

Anbieter: buecher.de
Stand: 23.11.2017
Zum Angebot
Linux Security Cookbook
32,99 € *
ggf. zzgl. Versand

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you´re grounded in the basics of security, however, you won´t necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That´s exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely. The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure. Some of the ´´recipes´´ you´ll find in this book are: * Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more * Monitoring your network with tcpdump, dsniff, netstat, and other tools * Protecting network connections with Secure Shell (SSH) and stunnel * Safeguarding email sessions with Secure Sockets Layer (SSL) * Encrypting files and email messages with GnuPG * Probing your own security with password crackers, nmap, and handy scripts This cookbook´s proven techniques are derived from hard-won experience. Whether you´re responsible for security on a home Linux system or for a large corporation, or somewhere in between, you´ll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver. Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you´re grounded in the basics of security, however, you won´t necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That´s exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the ´´recipes´´ you´ll find in this book are: * Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more * Monitoring your network with tcpdump, dsniff, netstat, and other tools * Protecting network connections with Secure Shell (SSH) and stunnel * Safeguarding email sessions with Secure Sockets Layer (SSL) * Encrypting files and email messages with GnuPG * Probing your own security with password crackers, nmap, and handy scripts This cookbook´s proven techniques are derived from hard-won experience. Whether you´re responsible for security on a home Linux system or for a large corporation, or somewhere in between, you´ll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Anbieter: buecher.de
Stand: 10.12.2017
Zum Angebot
The Basics of Hacking and Penetration Testing
20,99 € *
ggf. zzgl. Versand

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.

Anbieter: buecher.de
Stand: 23.11.2017
Zum Angebot
Hacking Etico 101 (eBook, ePUB)
7,99 € *
ggf. zzgl. Versand

Come hackeare professionalmente in meno di 21 giorni! Comprendere la mente dell´hacker, realizzare ricognizioni, scansioni ed enumerazione, effettuazione di exploit, come scrivere una relazione professionale, e altro ancora! Contenuto: La cerchia dell'hacking Tipi di hacking, modalità e servizi opzionale Riconoscimento passivo e attivo Google hacking, WhoIs e nslookup Footprinting con Maltego e Sam Spade Metodi di scansione e stati della porta Scansione con NMAP Analisi della vulnerabilità con Nexpose e OpenVAS Enumerazione di Netbios Meccanismi di hacking Metasploit Framework Attacchi di chiave Attacchi di malware Attacchi DoS Windows hacking con Kali Linux e Metasploit Hacking Wireless con Aircrack-ng Cattura di chiavi con sniffer di rete Attacchi MITM con Ettercap e Wireshark Ingegneria sociale con il SET Toolkit Phishing e iniettando malware con SET Hacking Metasploitable Linux con Armitage Suggerimenti per scrivere una buona relazione di controllo Certificazioni di sicurezza informatica e hacking pertinente

Anbieter: buecher.de
Stand: 09.12.2017
Zum Angebot
The Network Security Test Lab - A Step-by-Step ...
40,99 € *
ggf. zzgl. Versand

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. Youll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. Youll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. Get acquainted with your hardware, gear, and test platform Learn how attackers penetrate existing security systems Detect malicious activity and build effective defenses Investigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide. MICHAEL GREGG is CEO of Superior Solutions. He is the author of twenty security books, including Security+ Street Smarts, and a regular contributor to Huffington Post, SearchNetworking.com, and other periodicals. During his twenty years working in security, networking, and Internet technology, he has testified before U.S. Congress and has developed a variety of learning tools for colleges and training organizations.

Anbieter: ciando eBooks
Stand: 07.11.2017
Zum Angebot