Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Attacks Testing: How to Conduct Your Own Security Audit

Buy
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.

Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as:

  • Building a multisystem Tiger Box
  • Basic Windows 2000 Server installation and configuration for auditing
  • Basic Linux and Solaris installation and configuration
  • Basic Mac OS X installation and configuration for auditing
  • ISS, CyberCop, Nessus, SAINT, and STAT scanners
  • Using security analysis tools for Mac OS X
  • Vulnerability assessment

Bonus CD!

The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.

About the Author
JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

(HTML tags aren't allowed.)

Ajax in Oracle JDeveloper
Ajax in Oracle JDeveloper
Asynchronous JavaScript and XML (Ajax) is a web technique used to transfer data between a browser and server asynchronously without posting the web page to the server.

"Asynchronously" implies that the processing of the web page continues while the Ajax request is sent to the server and a response is received from the server.
...
High-Performance Web Databases: Design, Development, and Deployment
High-Performance Web Databases: Design, Development, and Deployment
IN THE PAST FEW DECADES, DATABASE SOLUTIONS AND DATA MANAGEMENT OPERATIONS HAVE SUPPORTED AN EVER-EXPANDING RANGE OF SOLUTIONS AND TECHNOLOGY ARCHITECTURES.

There is no abatement to this trend. Many end-to-end Information Technology (IT) solutions in the current environment include access to the World Wide Web and integration with one
...
HTML5 & CSS3 For The Real World
HTML5 & CSS3 For The Real World

Welcome to HTML5 & CSS3 for the Real World. We’re glad you’ve decided to join us on this journey of discovering some of the latest and the greatest in front-end website building technology.

If you’ve picked up a copy of this book, it’s likely that you’ve dabbled to some degree in HTML and...


The Definitive Guide to Magento
The Definitive Guide to Magento

This book takes a comprehensive look at Magento, a robust and flexible e-commerce platform built on the Zend framework. With over 750,000 downloads, Magento is the fastest growing open source e-commerce solution. This book walks you through all of the steps necessary to build a fully functional Magento-based web site. It also includes...

The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook: Hacking and Defending Oracle

Knowledge is power, and the power can be yours

While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you...

SQL Server 2000 Stored Procedure Programming
SQL Server 2000 Stored Procedure Programming

Design, deploy, and manage stored procedures in enterprise data applications

SQL Server 2000 Stored Procedure Programming shows you how to use Transact-SQL to design, debug, and manage custom stored procedures, functions, and triggers. You'll learn to manage SQL Server resources using new features of Enterprise Manager, Query analyzer,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy