Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Intrusion Detection


1. 

Kali Linux CTF Blueprints

Kali Linux CTF Blueprints

By: Cameron Buchanan

Publisher: Packt Publishing

Publication Date: 24-JUL-2014

Insert Date: 25-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Put the skills of the experts to the test with these tough and customisable pentesting projects Develop each challenge to suit your specific training, testing, or client engagement needs Hone your skills, from wireless attacks to social engineering, without the need to access live systems In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand....

2. 

Professional Penetration Testing, 2nd Edition

Professional Penetration Testing, 2nd Edition

By: Thomas Wilhelm

Publisher: Syngress

Publication Date: 27-JUN-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. ...

3. 

Network Anomaly Detection: A Machine Learning Perspective

Network Anomaly Detection: A Machine Learning Perspective

By: Dhruba Bhattacharyya; Jugal Kalita

Publisher: Chapman and Hall/CRC

Publication Date: 18-JUN-2013

Insert Date: 21-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

This book discusses the detection of anomalies in computer networks from a machine learning perspective. It examines how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. You’ll learn how to look for patterns in captured network traffic data to unearth potential intrusion attempts. Coverage includes machine learning techniques and algorithms, a taxonomy of attacks, and practical tools for launching attacks, capturing packet or flow traffic, extracting features, detecting attacks, and evaluating performance. ...

4. 

Instant OSSEC Host-based Intrusion Detection

Instant OSSEC Host-based Intrusion Detection

By: Brad Lhotsky;

Publisher: Packt Publishing

Publication Date: 22-AUG-2013

Insert Date: 31-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

A hands-on guide exploring OSSEC HIDS for operational and security awareness Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Install, configure, and customize an OSSEC-HIDS for your environment Manage your OSSEC-HIDS robust and comprehensive security checks Write your own rules and decoders to enhance alert accuracy and expand operational and security intelligence In Detail Security software is often expensive, restricting, burdensome, and noisy. OSSEC-HIDS was designed to avoid getting in your way and to allow you to take...

5. 

The Basics of Hacking and Penetration Testing, 2nd Edition

The Basics of Hacking and Penetration Testing, 2nd Edition

By: Patrick Engebretson

Publisher: Syngress

Publication Date: 24-JUN-2013

Insert Date: 16-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and...

6. 

BackTrack – Testing Wireless Network Security

BackTrack – Testing Wireless Network Security

By: Kevin Cardwell;

Publisher: Packt Publishing

Publication Date: 25-JUN-2013

Insert Date: 03-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide Make your wireless networks bulletproof Easily secure your network from intruders See how the hackers do it and learn how to defend yourself In Detail Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by...

7. 

Penetration Testing: Protecting Networks and Systems

Penetration Testing: Protecting Networks and Systems

By: Kevin M. Henry

Publisher: IT Governance Ltd

Publication Date: 21-JUN-2012

Insert Date: 11-JUN-2013

Slots: 1.0

Table of Contents • Start Reading

"Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination provides a widely recognized certification for penetration testers. The fundamentals of penetration testing This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors,...

8. 

Wireless Reconnaissance in Penetration Testing

Wireless Reconnaissance in Penetration Testing

By: Matthew Neely; Alex Hamerstone; Chris Sanyk

Publisher: Syngress

Publication Date: 31-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing  describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what...

9. 

BackTrack 5 Cookbook

BackTrack 5 Cookbook

By: Willie Pritchett; David De Smet

Publisher: Packt Publishing

Publication Date: 21-DEC-2012

Insert Date: 24-DEC-2012

Slots: 1.0

Table of Contents • Start Reading

"Over 90 recipes to execute many of the best known and little known penetration-testing aspects of BackTrack 5 with this book and ebook. Learn to perform penetration tests with BackTrack 5 Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools Provides detailed step-by-step instructions on the usage of many of BackTrack’s popular and not-so- popular tools In Detail BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native...

10. 

Łamanie i zabezpieczanie aplikacji w systemie iOS

Łamanie i zabezpieczanie aplikacji w systemie iOS

By: 

Publisher: Helion

Publication Date: 15-NOV-2012

Insert Date: 20-NOV-2012

Slots: 1.0

Table of Contents • Start Reading

Twoja lektura obowiązkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urządzeniach firmy Apple. Jednak dzięki tej popularności jest on też łakomym kąskiem dla hakerów. Uzyskanie dostępu do danych przechowywanych w telefonie może mieć katastrofalne skutki. Dlatego jeżeli tworzysz aplikacje na platformę iOS, ta książka jest dla Ciebie pozycją obowiązkową. Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz...

11. 

Privacy, Intrusion Detection and Response

Privacy, Intrusion Detection and Response

By: Peyman Kabiri

Publisher: IGI Global

Publication Date: 31-OCT-2011

Insert Date: 23-OCT-2012

Slots: 1.0

Table of Contents • Start Reading

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security...

12. 

Penetration Testing mit Metasploit, 2nd Edition

Penetration Testing mit Metasploit, 2nd Edition

By: Frank Neugebauer

Publisher: dpunkt

Publication Date: 15-MAY-2012

Insert Date: 10-OCT-2012

Slots: 1.0

Table of Contents • Start Reading

Metasploit ist das wichtigste Werkzeug zum Aufspüren von Sicherheitslücken in Computersystemen (Penetration Testing).+ Schneller, praxisorientierter Einstieg+ Gute Wochenendunterhaltung für Geeks ...

13. 

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

By: Shakeel Ali; Tedi Heriyanto

Publisher: Packt Publishing

Publication Date: 14-APR-2011

Insert Date: 03-NOV-2011

Slots: 1.0

Table of Contents • Start Reading

Overview of BackTrack 4: Assuring Security by Penetration Testing Learn the black-art of penetration testing with in-depth coverage of BackTrack Linux distribution Explore the insights and importance of testing your corporate network systems before hackers strike it Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits Fully illustrated with practical examples, step-by-step instructions, and useful tips to cover the best-of-breed security assessment tools In Detail BackTrack is a penetration testing and security...

14. 

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing

By: Patrick Engebretson

Publisher: Syngress

Publication Date: 21-JUL-2011

Insert Date: 16-SEP-2011

Slots: 1.0

Table of Contents • Start Reading

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics....

15. 

Penetration Tester's Open Source Toolkit

Penetration Tester's Open Source Toolkit

By: Jeremy Faircloth

Publisher: Syngress

Publication Date: 18-JUL-2011

Insert Date: 14-SEP-2011

Slots: 1.0

Table of Contents • Start Reading

Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkit, Third Edition, expands upon existing instructions so that a professional can get the most...

16. 

The Rootkit Arsenal: Escape and Evasion

The Rootkit Arsenal: Escape and Evasion

By: Bill Blunden

Publisher: Jones & Bartlett Learning

Publication Date: 23-JUN-2009

Insert Date: 07-MAY-2011

Slots: 1.0

Table of Contents • Start Reading

With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so, the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented....

17. 

Socioeconomic and Legal Implications of Electronic Intrusion

Socioeconomic and Legal Implications of Electronic Intrusion

By: Dionysios Politis; Phaedon Kozyris; Ioannis Iglezakis

Publisher: IGI Global

Publication Date: 30-APR-2009

Insert Date: 09-MAY-2010

Slots: 1.0

Table of Contents • Start Reading

Socioeconomic and Legal Implications of Electronic Intrusion focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues. ...

18. 

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams

By: 

Publisher: John Wiley & Sons

Publication Date: 22-SEP-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any...

19. 

Penetration Tester's Open Source Toolkit, 2nd Edition

Penetration Tester's Open Source Toolkit, 2nd Edition

By: Jeremy Faircloth; Chris Hurley

Publisher: Syngress

Publication Date: 16-NOV-2007

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. • Perform Network Reconnaissance Master the...

20. 

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

By: Brian Caswell; Jay Beale; Gilbert Ramirez; Noam Rathaus

Publisher: Syngress

Publication Date: 14-SEP-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to “sniff” their network for malicious or unusual traffic. The book will also contain an appendix detailing “the best of the rest” open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they...