Skip to content
Paperback Anti Hacker Tool Kit: Key Security Tools and Configuration Techniques [With CDROM] Book

ISBN: 0072222824

ISBN13: 9780072222821

Anti Hacker Tool Kit: Key Security Tools and Configuration Techniques [With CDROM]

This volume provides detailed, experience-based coverage on key security tools and how to use them. Each tool discussion has tips and advice on how to configure tools to get the best results. This description may be from another edition of this product.

Recommended

Format: Paperback

Temporarily Unavailable

2 people are interested in this title.

We receive 2 copies every 6 months.

Customer Reviews

5 ratings

Excellent Resource

If you are tired of cloudy, non-specific examples relating to security, this book is great. It details, with examples, exactly how to perform security functions. I use it for a research group I am heading (www.nmt.edu/~ccravens) and it is definitely an incredible find for our purposes. PS- A Reader, having never read the book, whenever you come out with your next best seller, lemme know, I might be interested! ;)

Act b4 they HACK>>>>>>

Anti Hacker Toolkit is one of the best security books which i came across.Being a beginner in the field of computer security, i was a bit apprehensive of goin thru this book.This is the most comprehensive guide which is worth every cent, if u ever read one of the hacking exposed series.

Move Over Webster........

In just the few months since it has been published, I have used The Anti-Hacker Toolkit countless times as a reference...move over Webster! The book has been invaluable as it provides a comprehensive yet concise discussion on each tool. The Anti-Hacker Toolkit covers everything from installation to implementation and everything in between! Section IV on Forensics and Incident Response has been an especially useful guide in reconstructing e-mail and browsing history. It is an un-biased, get "down and dirty" guide to security tools that every computer security professional should read. Jones, Johnson and Shema are to Computer Security what Bob Vila is to Home Improvement.

Most practical security tool book on the market

"Anti-Hacker Toolkit" (AHT) is a first-rate, hands-on, learn-by-following-along security book. It's advertised as a complement to Foundstone's "Incident Response" and "Hacking Exposed" titles, but it contains more than enough original material to stand on its own. Even if you've used all of the tools described in AHT, you're sure to gain insight on using many of them in unique and creative ways. Throughout the book, I was impressed by the authors' attention to detail. They seem to have anticipated the sorts of questions both beginners and experts might have regarding numerous security tools. AHT contains balanced material on both UNIX and Windows applications. It is particularly strong with regard to integration of BSD tools. In a world where many believe "free" and "open source" equal "Linux", attention to BSD was very welcome. Several chapters were especially useful. These included discussions of netcat, the X Windows System, and Windows enumeration using the PStools. Furthermore, over two hundred pages are devoted to incident response and digital forensics. The authors discuss how to image and investigate systems using commercial and open source solutions. I appreciated their desire to steer clear of theory in favor of providing hands-on examples. AHT continues the recent Osborne McGraw-Hill tradition of including numerous case studies which reinforce the proper use of tools in real-world environments. AHT is a must-have book for 2002. (Note that it is NOT related in any way to the book "Hackers Beware," as alluded to by a previous reviewer.) Even if you've been using security tools for years, you're sure to find new approaches to better assess or secure your enterprise. This book belongs next to any of Foundstone's other titles on your bookshelf.

Hackers Beware. . . .Expanded !

'Hackers Beware', is a very useful book, no doubts. But its son: 'Anti-Hacker Toolkit' is by far, the most useful 'practical' book in the area of computer security. Tons. (I do mean Tons.) of cases and scenarios are thoroughly reviewed. Any relevant TOOL (offensive or defensive) is explored, lot of case studies are presented (in depth), and as an added bonus, almost every scenario is discussed both for Windows and UNIX.It is not a theoretical book, it is a real 'learn by understanding how to hack' book. However,even if no too much, you'll need some basic knowledge about the area, to take full advantage of this book.Needless to say the companion CD is, not only multi platform, but FULL of valuable tools.I have reviewed a lot of security books (good books), but this one really impressed me very much.The forensic chapters alone, justify buying the book !!
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured