HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Assessing Network Security (Pro-One-Offs) by…
Loading...

Assessing Network Security (Pro-One-Offs)

by Ben Smith

MembersReviewsPopularityAverage ratingConversations
1None3,689,591NoneNone
Recently added byLiosliath

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Product Description (ISBN 0735620334, Paperback)

Don’t wait for an attacker to find and exploit your security vulnerabilities—take the lead by assessing the state of your network’s security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features time-saving tools and scripts that you can use to reveal and help correct security vulnerabilities in your own network.

Sharpen and advance your security assessment skills, including how to:

Detect vulnerabilities and perform penetration tests Conduct and properly report an IT security audit Find hidden hosts by using DNS, WINS, and NetBIOS Sweep your network to analyze network topology, existing hosts, and multi-homed systems Determine the status of ICP and UDP ports by using port scanning

Recognize and help counter common network threats, including:

War dialing, war driving, and Bluetooth attacks Packet and network sniffing IP, e-mail, and DNS spoofing Password cracking Communication interceptions and modifications IDS and IPS attacker detection avoidance Spam and other e-mail abuses

CD features:

Tools for testing e-mail, databases, and Web servers Scripts for finding common information leaks and other potential security issues Complete eBook in PDF format

A Note Regarding the CD or DVD

The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

(retrieved from Amazon Thu, 12 Mar 2015 18:14:25 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
1 wanted

Popular covers

None

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

You are using the new servers! | About | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 117,018,207 books! | Top bar: Always visible