Hack Attacks Testing: How to Conduct Your Own Security Audit

Author:   John Chirillo
Publisher:   John Wiley and Sons Ltd
Edition:   New edition
ISBN:  

9780471229469


Pages:   560
Publication Date:   12 March 2003
Format:   Paperback
Availability:   Out of stock   Availability explained


Our Price $132.00 Quantity:  
Add to Cart

Share |

Hack Attacks Testing: How to Conduct Your Own Security Audit


Add your own review!

Overview

A network security breach (a hack, crack or other invasion) occurs when unauthorized access to the network is achieved, and havoc results. A good defence is an offensive strategy that allows regular testing of a network to reveal the vulnerabilities before a hack learns of them. This text offers step-by-step guidance so that an IT professional may test his/her own network security with customized software. John Chirillo provides readers with detailed information on how to build and operate a reliable security analysis/monitoring system.

Full Product Details

Author:   John Chirillo
Publisher:   John Wiley and Sons Ltd
Imprint:   John Wiley & Sons Inc
Edition:   New edition
Dimensions:   Width: 19.00cm , Height: 3.20cm , Length: 23.50cm
Weight:   0.878kg
ISBN:  

9780471229469


ISBN 10:   0471229466
Pages:   560
Publication Date:   12 March 2003
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Stock Indefinitely
Availability:   Out of stock   Availability explained

Table of Contents

Acknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.

Reviews

Author Information

JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List