by August 4, 2005 0 comments



As the name suggests, this book covers a number of tools that you can use against hackers to stop them track your system and network. It provides complete details of most critical security tools and explains their function. Case studies given in the book can help you implement these tools in real-world situations. The good thing is that you don’t need to hunt around to get these tools. The CD given along with this book carries around 40 tools that have been covered in the book. Network and system administrators can take advantage of resources provided in this book.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

<