Sign up for ISW's Newsletter
 

Host Security books:

Host Security /

HackNotes(tm) Linux and Unix Security Portable Reference by Nitesh Dhanjani
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap. Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-services, NFS, SAMBA, POP, IMAP, MySQL, X, and VNC. Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders. Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more! (from Amazon.com)
-
HackNotes(tm) Windows Security Portable Reference by Michael O'Dea
Secure Windows 2000 Server, Windows XP systems, and Windows Server 2003. The book explains how to follow reference matrixes of useful services for Windows and UNIX. Plus, you'll learn best practices for trace routing and source address location.(from Amazon.com)
-
Windows Forensics and Incident Recovery by Harlan Carvey
Excerpt from mailing... While there are many security books available, few focus specifically on Windows security. This book is a detailed technical reference for those who use Windows NT/2000/XP and Windows Server 2003 operating systems. The book provides the reader with information, tools, and example methodologies for examing and recovering a system that may have been
-

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.