lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3AF76382C31760418AF0FBFD84F714030140060D@MI8NYCMAIL07.Mi8.com>
From: pwicks at oxygen.com (James Patterson Wicks)
Subject: Good security books

Not sure what area of security you are looking to cover specifically,
but I enjoyed this book: 

Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
http://search.barnesandnoble.com/booksearch/isbnInquiry.asp?userid=QC7Cg
j6B0Z&isbn=0072227427&itm=1

The countermeasures section was sparse on details, but gave you a good
starting point when trying to combat specific threats.  The other
chapters teach you how to perform the threats so that you can test your
defenses.  Here are a few of the notes on the book:
# Each part opens with a brand new case study based on real security
scenarios
# Brand new chapter covers the latest 802.11 Wireless networking
security attacks and countermeasures
# New strategies for proactively defending against dial-up, PBX,
voicemail, and VPN hacks
# Completely rewritten enumeration chapter including new SQL Server
discovery tools, Windows XP/.NET Server countermeasures, Novell
exploits, and network discovery using BGP
# New techniques for gaining unauthorized access to Windows
9x/Me/NT/2000/XP, Novell 6, UNIX, and Linux
# Up-to-date countermeasures for preventing the exploitation of proxy
and packet filtering firewall vulnerabilities
# Web hacking chapter completely revised and updated to cover the latest
platform-specific vulnerabilities from Apache to IIS, current techniques
including cross-site scripting, fuzzing, and SQL injection attacks, and
all of the latest tools from Achilles to Nikto

-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Scott
White
Sent: Monday, March 14, 2005 3:36 PM
To: full-disclosure@...ts.grok.org.uk
Subject: [Full-disclosure] Good security books

Group,

Any good security books fellow members have read recently and would like
to
recommend?
There is a lot more quantity than quality now a days

Thanks

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://www.secunia.com/


This e-mail is the property of Oxygen Media, LLC.  It is intended only for the person or entity to which it is addressed and may contain information that is privileged, confidential, or otherwise protected from disclosure. Distribution or copying of this e-mail or the information contained herein by anyone other than the intended recipient is prohibited. If you have received this e-mail in error, please immediately notify us by sending an e-mail to postmaster@...gen.com and destroy all electronic and paper copies of this e-mail.

Notice: This email message is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and destroy all copies of the original message. 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ