Hack Attacks Testing (PDF)
How to Conduct Your Own Security Audit
(Sprache: Englisch)
Learn how to conduct thorough security examinations via
illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion)
occurs when unauthorized access to the network is achieved and
havoc results. The best possible...
illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion)
occurs when unauthorized access to the network is achieved and
havoc results. The best possible...
sofort als Download lieferbar
eBook (pdf)
30.99 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
Produktdetails
Produktinformationen zu „Hack Attacks Testing (PDF)“
Learn how to conduct thorough security examinations via
illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion)
occurs when unauthorized access to the network is achieved and
havoc results. The best possible defense is an offensive strategy
that allows you to regularly test your network to reveal the
vulnerabilities and close the holes before someone gets in. Written
by veteran author and security expert John Chirillo, Hack Attacks
Testing explains how to perform your own security audits.
Step by step, the book covers how-to drilldowns for installing
and configuring your Tiger Box operating systems, installations,
and configurations for some of the most popular auditing software
suites. In addition, it includes both common and custom usages,
scanning methods, and reporting routines of each. Finally, Chirillo
inspects the individual vulnerability scanner results and compares
them in an evaluation matrix against a select group of intentional
security holes on a target network. Chirillo tackles such topics
as:
* Building a multisystem Tiger Box
* Basic Windows 2000 Server installation and configuration for
auditing
* Basic Linux and Solaris installation and configuration
* Basic Mac OS X installation and configuration for auditing
* ISS, CyberCop, Nessus, SAINT, and STAT scanners
* Using security analysis tools for Mac OS X
* Vulnerability assessment
Bonus CD!
The CD contains virtual simulations of scanners, ISS Internet
Scanner evaluation version, and more.
illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion)
occurs when unauthorized access to the network is achieved and
havoc results. The best possible defense is an offensive strategy
that allows you to regularly test your network to reveal the
vulnerabilities and close the holes before someone gets in. Written
by veteran author and security expert John Chirillo, Hack Attacks
Testing explains how to perform your own security audits.
Step by step, the book covers how-to drilldowns for installing
and configuring your Tiger Box operating systems, installations,
and configurations for some of the most popular auditing software
suites. In addition, it includes both common and custom usages,
scanning methods, and reporting routines of each. Finally, Chirillo
inspects the individual vulnerability scanner results and compares
them in an evaluation matrix against a select group of intentional
security holes on a target network. Chirillo tackles such topics
as:
* Building a multisystem Tiger Box
* Basic Windows 2000 Server installation and configuration for
auditing
* Basic Linux and Solaris installation and configuration
* Basic Mac OS X installation and configuration for auditing
* ISS, CyberCop, Nessus, SAINT, and STAT scanners
* Using security analysis tools for Mac OS X
* Vulnerability assessment
Bonus CD!
The CD contains virtual simulations of scanners, ISS Internet
Scanner evaluation version, and more.
Autoren-Porträt von John Chirillo
JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.
Bibliographische Angaben
- Autor: John Chirillo
- 2003, 1. Auflage, 560 Seiten, Englisch
- Verlag: John Wiley & Sons
- ISBN-10: 0471463051
- ISBN-13: 9780471463054
- Erscheinungsdatum: 22.01.2003
Abhängig von Bildschirmgröße und eingestellter Schriftgröße kann die Seitenzahl auf Ihrem Lesegerät variieren.
eBook Informationen
- Dateiformat: PDF
- Größe: 6.10 MB
- Mit Kopierschutz
Sprache:
Englisch
Kopierschutz
Dieses eBook können Sie uneingeschränkt auf allen Geräten der tolino Familie lesen. Zum Lesen auf sonstigen eReadern und am PC benötigen Sie eine Adobe ID.
Kommentar zu "Hack Attacks Testing"
0 Gebrauchte Artikel zu „Hack Attacks Testing“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Hack Attacks Testing".
Kommentar verfassen