|
![]() |
|||
|
||||
OverviewA network security breach (a hack, crack or other invasion) occurs when unauthorized access to the network is achieved, and havoc results. A good defence is an offensive strategy that allows regular testing of a network to reveal the vulnerabilities before a hack learns of them. This text offers step-by-step guidance so that an IT professional may test his/her own network security with customized software. John Chirillo provides readers with detailed information on how to build and operate a reliable security analysis/monitoring system. Full Product DetailsAuthor: John ChirilloPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Inc Edition: New edition Dimensions: Width: 19.00cm , Height: 3.20cm , Length: 23.50cm Weight: 0.878kg ISBN: 9780471229469ISBN 10: 0471229466 Pages: 560 Publication Date: 12 March 2003 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Stock Indefinitely Availability: Out of stock ![]() Table of ContentsAcknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.ReviewsAuthor InformationJOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series. Tab Content 6Author Website:Countries AvailableAll regions |