01754nam a2200277 i 4500991000652719707536080513s2007 caua b 001 0 eng d05960096319780596009632b13890463-39ule_instDip.to Ingegneria dell'Innovazioneeng005.822Security power tools /Bryan Burns ... [et al.]Beijing :O'Reilly,c2007xxxii, 822 p. :ill. ;24 cmIncludes bibliographical references and indexPart 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.Computer networksSecurity measuresComputer securityBurns, Bryanauthorhttp://id.loc.gov/vocabulary/relators/aut151784.b1389046328-01-1424-03-10991000652719707536LE026 005.8 D BUR 01.01 200712026000055701le026Prof. Tommasi / BibliotecapE46.89-n- 10000.i1509821725-03-10Security power tools1440779UNISALENTOle02613-05-08ma -engcc 00