• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Hírek

  • 0
    Building Open Source Network Security Tools: Components and Techniques

    Building Open Source Network Security Tools by Schiffman, Mike;

    Components and Techniques

      • 10% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 30.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        15 684 Ft (14 937 Ft + 5% áfa)
      • Kedvezmény(ek) 10% (cc. 1 568 Ft off)
      • Discounted price 14 115 Ft (13 443 Ft + 5% áfa)

    Beszerezhetőség

    A kiadónál véglegesen elfogyott, nem rendelhető. Érdemes újra keresni a címmel, hátha van újabb kiadás.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadó John Wiley & Sons
    • Megjelenés dátuma 2002. november 12.

    • ISBN 9780471205449
    • Kötéstípus Puhakötés
    • Terjedelem416 oldal
    • Méret 228x193x24 mm
    • Súly 776 g
    • Nyelv angol
    • 0

    Kategóriák

    Rövid leírás:

    The first book to provide cost-effective, time-saving guidance to building customised network security tools using existing components.

    For many businesses, the cost of building increased security into their network is difficult, time-consuming, and costly.

    Több

    Hosszú leírás:

    Learn how to protect your network with this guide to building complete and fully functional network security tools

    Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area whether it's additional functionality, a specific feature, or a narrower scope.


    Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own network security tools that meet the needs of your company. To accomplish this, you'll first learn about the Network Security Tool Paradigm in addition to currently available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. Schiffman offers a detailed discussion of these components, helping you gain a better understanding of the native datatypes and exported functions. Next, you'll find several key techniques that are built from the components as well as easy-to-parse programming examples. The book then ties the model, code, and concepts together, explaining how you can use this information to craft intricate and robust security programs. Schiffman provides you with cost-effective, time-saving guidance on how to build customized network security tools using existing components. He explores:



    • A multilayered model for describing network security tools

    • The ins and outs of several specific security-related components

    • How to combine these components into several useful network security techniques

    • Four different classifications for network security tools: passive reconnaissance, active reconnaissance, attack and penetration, and defensive


    How to combine techniques to build customized network security tools
    The companion Web site contains all of the code from the book.



    Learn how to protect your network with this guide to building complete and fully functional network security tools



    Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area - - whether it's additional functionality, a specific feature, or a narrower scope. Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own network security tools that meet the needs of your company. To accomplish this, you'll first learn about the Network Security Tool Paradigm in addition to currently available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. Schiffman offers a detailed discussion of these components, helping you gain a better understanding of the native datatypes and exported functions. Next, you'll find several key techniques that are built from the components as well as easy-to-parse programming examples. The book then ties the model, code, and concepts together, explaining how you can use this information to craft intricate and robust security programs.



    Schiffman provides you with cost-effective, time-saving guidance on how to build customized network security tools using existing components. He explores:

    * A multilayered model for describing network security tools

    * The ins and outs of several specific security-related components

    * How to combine these components into several useful network security techniques

    * Four different classifications for network security tools: passive reconnaissance, active reconnaissance, attack and penetration, and defensive

    * How to combine techniques to build customized network security tools



    The companion Web site contains all of the code from the book.

    if you ever write your own networking code, buy this book (iSeries Network, 6 March 2003)

    if you ever write your own networking code, buy this book (iSeries Network, 6 March 2003)

    Több

    Tartalomjegyzék:

    Acknowledgments.



    About the Author.



    About the Contributor.



    About the Technical Reviewer.



    Introduction.



    The Network Security Tool Paradigm.



    The Libpcap Library.



    The Libnet Library.



    The Libnids Library.



    The Libsf Library.



    The Libdnet Library.



    The OpenSSL Library.



    Passive Reconnaissance Techniques.



    Active Reconnaissance Techniques.



    Attack and Penetration Techniques.



    Defensive Techniques.



    Tying Everything Together: Firewalk.



    References.



    Index.

    Több
    Mostanában megtekintett
    previous
    High Performance Computing on Vector Systems 2007

    High Performance Computing on Vector Systems 2007

    Roller, Sabine; Lammers, Peter; Furui, Toshiyuki;(ed.)

    45 385 Ft

    next