Get in-depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.About the Author:
Keith J. Jones (Glen Burnie, MD) is a contributing author of Hacker's Challenge (Osborne). He is a computer forensic consultant for Foundstone, one of the top security firms. His primary area of concentration is incident response program development and computer forensics. Jones specializes in log analysis, computer crime investigations, forensic tool analysis and specialized attack and penetration testing. At Foundstone, Jones has investigated several different types of cases including intellectual property theft, financial embezzlement, negligence, and external attacks. Bradley C. Johnson (Gaithersburg, MD) is currently the manager of the Network and Security. Group at Viaken Systems, a biotech IT provider. Johnson is responsible for the security and functionality of both Viaken's internal network as well as its customers' networks. He has a great deal of experience with tools used to protect and monitor computer networks, such as firewalls, intrusion detection systems, vulnerability and port scanners, network-wide system monitors, and log archival tools.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción McGraw-Hill Osborne Media, 2002. Paperback. Estado de conservación: New. 1. Nº de ref. de la librería DADAX0072222824
Descripción McGraw-Hill Osborne Media, 2002. Paperback. Estado de conservación: New. book. Nº de ref. de la librería 0072222824
Descripción Estado de conservación: Brand New. Book Condition: Brand New. Nº de ref. de la librería 97800722228211.0
Descripción Blacklick, Ohio, U.S.A.: McGraw-Hill Osborne Media, 2002. Soft cover. Estado de conservación: New. Brand new book - no defects.-.-. Nº de ref. de la librería ABE-1141902901