top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
Autore Cardwell Kevin
Pubbl/distr/stampa Birmingham, : Packt Pub., 2013
Descrizione fisica 1 online resource (108 p.)
Collana Open source : community experience distilled
Soggetto topico Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing
Open source software
Soggetto genere / forma Electronic books.
ISBN 1-78216-407-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network.
Record Nr. UNINA-9910463038803321
Cardwell Kevin  
Birmingham, : Packt Pub., 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
Autore Cardwell Kevin
Pubbl/distr/stampa Birmingham, : Packt Pub., 2013
Descrizione fisica 1 online resource (108 p.)
Collana Open source : community experience distilled
Soggetto topico Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing
Open source software
ISBN 1-78216-407-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network.
Record Nr. UNINA-9910786936503321
Cardwell Kevin  
Birmingham, : Packt Pub., 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
BackTrack : testing wireless network security / / Kevin Cardwell
BackTrack : testing wireless network security / / Kevin Cardwell
Autore Cardwell Kevin
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, : Packt Pub., 2013
Descrizione fisica 1 online resource (108 p.)
Disciplina 005.8
Collana Open source : community experience distilled
Soggetto topico Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing
Open source software
ISBN 1-78216-407-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network.
Record Nr. UNINA-9910829029903321
Cardwell Kevin  
Birmingham, : Packt Pub., 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
Autore Cardwell Kevin
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress
Descrizione fisica 1 online resource (734 p.)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Electronic discovery (Law)
Soggetto genere / forma Electronic books.
ISBN 1-281-09638-5
9786611096380
0-08-055608-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?"
SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience
Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!
Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works?
Conduct Objective Analysis and Reporting
Record Nr. UNINA-9910450874203321
Cardwell Kevin  
Rockland, Mass., : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
Autore Cardwell Kevin
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress
Descrizione fisica 1 online resource (734 p.)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Electronic discovery (Law)
ISBN 1-281-09638-5
9786611096380
0-08-055608-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?"
SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience
Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!
Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works?
Conduct Objective Analysis and Reporting
Record Nr. UNINA-9910785099903321
Cardwell Kevin  
Rockland, Mass., : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn cybercrime and digital forensics book period / / Kevin Cardwell [et al.]
The best damn cybercrime and digital forensics book period / / Kevin Cardwell [et al.]
Autore Cardwell Kevin
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress
Descrizione fisica 1 online resource (734 p.)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Electronic discovery (Law)
ISBN 1-281-09638-5
9786611096380
0-08-055608-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?"
SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience
Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!
Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works?
Conduct Objective Analysis and Reporting
Record Nr. UNINA-9910814601103321
Cardwell Kevin  
Rockland, Mass., : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Autore Cardwell Kevin
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (518 pages)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computer security - Testing
Computer networks - Security measures
Computers - Access control
ISBN 1-78588-495-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798777903321
Cardwell Kevin  
Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Autore Cardwell Kevin
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (518 pages)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computer security - Testing
Computer networks - Security measures
Computers - Access control
ISBN 1-78588-495-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910822503303321
Cardwell Kevin  
Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi
Autore Cardwell Kevin
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (430 p.)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computer networks - Security measures
Computer security - Testing
Computers - Access control
Soggetto genere / forma Electronic books.
ISBN 1-78328-478-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; Abstract testing methodology; Planning; Nonintrusive target search; Intrusive target search; Data analysis; Reporting; Myths and misconceptions of pen testing; Summary; Chapter 2: Choosing the Virtual Environment; Open source and free environments; VMware Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments
vSphereVMware Player Plus; XenServer; VMware Workstation; Image conversion; Converting from a physical to virtual environment; Summary; Chapter 3: Planning a Range; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary; Chapter 4: Identifying Range Architecture; Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components
The attacker machineRouter; Firewall; Web server; Summary; Chapter 5: Identifying a Methodology; The OSSTMM; The Posture Review; Logistics; Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification; Configuration verification; Property validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques
Comparing tests and examinationsTesting viewpoints; Overt and covert; Offensive Security; Other methodologies; Customization; Summary; Chapter 6: Creating an External Attack Architecture; Establishing layered architectures; Configuring firewall architectures; iptables; Deploying IDS/IPS and load balancers; Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Load balancers; Integrating web application firewalls; Summary; Chapter 7: Assessment of Devices; Assessing routers; Evaluating switches; MAC attacks; VLAN hopping attacks; GARP attacks; Attacking the firewall
Identifying the firewall rulesTricks to penetrate filters; Summary; Chapter 8: Architecting an IDS/IPS Range; Deploying a network-based IDS; Implementing the host-based IDS and endpoint security; Working with virtual switches; Evasion; Determining thresholds; Stress testing; Shell code obfuscation; Summary; Chapter 9: Assessment of Web Servers and Web Applications; Analyzing the OWASP Top Ten attacks; Injection flaws; Broken authentication and session management; Cross-Site Scripting; Insecure direct object references; Security misconfiguration; Sensitive data exposure
Missing function-level access control
Record Nr. UNINA-9910464689203321
Cardwell Kevin  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi
Autore Cardwell Kevin
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (430 p.)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computer networks - Security measures
Computer security - Testing
Computers - Access control
ISBN 1-78328-478-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; Abstract testing methodology; Planning; Nonintrusive target search; Intrusive target search; Data analysis; Reporting; Myths and misconceptions of pen testing; Summary; Chapter 2: Choosing the Virtual Environment; Open source and free environments; VMware Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments
vSphereVMware Player Plus; XenServer; VMware Workstation; Image conversion; Converting from a physical to virtual environment; Summary; Chapter 3: Planning a Range; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary; Chapter 4: Identifying Range Architecture; Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components
The attacker machineRouter; Firewall; Web server; Summary; Chapter 5: Identifying a Methodology; The OSSTMM; The Posture Review; Logistics; Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification; Configuration verification; Property validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques
Comparing tests and examinationsTesting viewpoints; Overt and covert; Offensive Security; Other methodologies; Customization; Summary; Chapter 6: Creating an External Attack Architecture; Establishing layered architectures; Configuring firewall architectures; iptables; Deploying IDS/IPS and load balancers; Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Load balancers; Integrating web application firewalls; Summary; Chapter 7: Assessment of Devices; Assessing routers; Evaluating switches; MAC attacks; VLAN hopping attacks; GARP attacks; Attacking the firewall
Identifying the firewall rulesTricks to penetrate filters; Summary; Chapter 8: Architecting an IDS/IPS Range; Deploying a network-based IDS; Implementing the host-based IDS and endpoint security; Working with virtual switches; Evasion; Determining thresholds; Stress testing; Shell code obfuscation; Summary; Chapter 9: Assessment of Web Servers and Web Applications; Analyzing the OWASP Top Ten attacks; Injection flaws; Broken authentication and session management; Cross-Site Scripting; Insecure direct object references; Security misconfiguration; Sensitive data exposure
Missing function-level access control
Record Nr. UNINA-9910786642603321
Cardwell Kevin  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui