- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
Used Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
More copies of this ISBN
Network Security Assessment : Know Your Network (2ND 07 Edition)by Chris Mcnab
Synopses & ReviewsPlease note that used books may not include additional media (study guides, CDs, DVDs, solutions manuals, etc.) as described in the publisher comments.
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
This thorough and insightful guide covers security technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--to help administrators design and deploy security assessment networks.
About the Author
Dr. Chris McNab (United Kingdom) is the author of "Endurance Techniques (SAS Training Manual)"; "Elite Forces Survival Guides"; "How to Pass the SAS Selection Course"; "Martial Arts for Special Forces"; and "Urban Survival".
Table of Contents
ForewordPrefaceChapter 1: Network Security AssessmentChapter 2: Network Security Assessment PlatformChapter 3: Internet Host and Network EnumerationChapter 4: IP Network ScanningChapter 5: Assessing Remote Information ServicesChapter 6: Assessing Web ServersChapter 7: Assessing Web ApplicationsChapter 8: Assessing Remote Maintenance ServicesChapter 9: Assessing Database ServicesChapter 10: Assessing Windows Networking ServicesChapter 11: Assessing Email ServicesChapter 12: Assessing IP VPN ServicesChapter 13: Assessing Unix RPC ServicesChapter 14: Application-Level RisksChapter 15: Running NessusChapter 16: Exploitation FrameworksTCP, UDP Ports, and ICMP Message TypesSources of Vulnerability InformationExploit Framework ModulesColophon
What Our Readers Are Saying