Open Source PenTester & Security Professional Double CD Pack

Johnny Long
4.5
4 ratings 0 reviews
Get five of Syngress's best-selling penetration testing and open source security books including the brand new Penetration Tester's Open Source Toolkit in a convenient, double CD at over 50% off the retail price of the books. This unbeatable package also includes the Security Auditor Toolkit with over 300 PenTesting Tools on a Bootable Linux CD. CD includes the following best-selling PDF e-books: Penetration Tester's Open Source Toolkit by Johnny Long, Chris Hurley, SensePost, Mark Wolfgang, and Mike Petruzzi This book provides all the information needed to start working in a great and challenging area of computer security.--Max Moser Master the Art of Reconnaissance, Enumerating, and Writing Open Source Tools Use NASL Extensions, and Metasploit as an Exploitation Platform PenTest Enterprise Networks, Wireless Networks, Web Servers, Network Devices, and More! Google Hacking for Penetration Testers by Johnny Long "Reading and experimenting with Google Hacking For Penetration Testers is the best insurance policy you could buy. . ."--Richard Bejtlich, Founder, TaoSecurity. Morph Google from Directory Assistance Please into a Rig Mounted Pneumatic Rock Dril See How Bad Guys Use Portscans, CGI Scans, and Web Server Fingerprinting to Stroll in the Back Door of Your Enterprise Slam the Door on Malicious Google Hacks That Expose Your Organizations Information Caches, Firewalls, IDS Logs, and Password Databases Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring and Bruce Potter "What a breath of fresh air! Wotring and Potter take the reader from a definition of integrity monitoring and fundamental principles to the pragmatic "how to" implement a monitoring capability - step by step."--Stephen Northcutt, Director, Director of Training & Certification, The SANS Institute Written by Osiris Creator and Shmoo Group Member Quickly Identify Successful Attacks to Mitigate Damage Complete Reference for Planning, Deployment, and Administration Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications by Brian Caswell, Gilbert Ramirez, Jay Beale, Noam Rathaus, and Neil Archibald Create, Customize, and Automate NASLs to Extend the Capabilities of Nessus Modify and Optimize Snort Performance with Advanced Rules, Plugins, and Preprocessors Enable Ethereal to Read New Data Sources and Build Customized Reports Download Working Code and Scripts from syngress.com Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin Great job, the authors obviously put a lot of thought into it.--Anthony Lawrence Automate Responses to Attempted Intrusions Master Buffer Overflow Prevention Technologies Avoid False Positives Browse Catalog Certification Cisco Engineering CyberFiction Ethics Hacking Internet Protocols Lego/Home Open Source Outlet Programming SANSPress Security UltimateCDs Windows Sys Admin Wireless
Genres:
Pages

Community Reviews:

5 star
2 (50%)
4 star
2 (50%)
3 star
0 (0%)
2 star
0 (0%)
1 star
0 (0%)

Readers also enjoyed

Other books by Johnny Long

Lists with this book