- Shopping Bag ( 0 items )
If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Chapter 1 Hardware and Gear.
Chapter 2 Building a Software Test Platform.
Chapter 3 Passive Information Gathering.
Chapter 4 Detecting Live Systems.
Chapter 5 Enumerating Systems.
Chapter 6 Automated Attack and Penetration Tools.
Chapter 7 Understanding Cryptographic Systems.
Chapter 8 Defeating Malware.
Chapter 9 Securing Wireless Systems.
Chapter 10 Intrusion Detection.
Chapter 11 Forensic Detection.
Appendix A About the DVD.