gogo
Amazon cover image
Image from Amazon.com

Assessing network security / Kevin Lam, David LeBlanc, Ben Smith.

By: Contributor(s): Material type: TextTextPublication details: Redmond, Wash. : Microsoft, c2004.Description: xxix, 553 p. : ill. ; 23 cmISBN:
  • 9780735620339 (pbk.) :
  • 9780735620339
Subject(s): DDC classification:
  • 005.8 LAM
LOC classification:
  • TK5105.59.L36 .L36 2004
Contents:
Part I: Planning and performing security assessements -- 1.Introduction to performing security assessments -- 2.Key principles of security -- 3.Using vulnerability scanning to assess network security-- 4.Conducting a penetration test -- 5.Performing IT security audits -- 6.Reporting your findings -- 7.Building and maintaining your secruity assessment skills -- Part II.Penetrration testing for nonintrusive attacks -- 8.Information reconnaissance -- 9.Host discovery using DNS and NetBIOS -- 10.Network and host discovery -- 11.Port scanning-- 12.Obtaining information from a host -- 13.War dialing, war driving, and bluetooth attacks -- Part III.Penetration testing for intrusive attacks -- 14.Automated vulnerability detection -- 15.Password attacks -- 16.Denial of service attacks -- 17.Application attacks -- 18.Database attacks -- 19.Networks sniffing -- 20.Spoofing -- 21.Session hijacking -- 22.How attackers avoid detection -- 23.Attackers using non-network methods to gain access -- Part IV.Security assessment case studie s-- 24.Web threats -- 25.E-mail threats -- 26.Domain controller threats -- 27.Extranet and VPN threats -- Part V.Appendixes. A. Checklists -- B.References.
Holdings
Item type Current library Call number Vol info Copy number Status Date due Barcode
Long Loan TUS: Midlands, Main Library Athlone General Lending 005.8 LAM (Browse shelf(Opens below)) 1 Available 219247
Long Loan TUS: Midlands, Main Library Athlone CD 005.8 LAM (Browse shelf(Opens below)) CD 1185 1 Available 222812

Includes index.

CD-ROM in back pocket.

Includes bibliographical references (p. 515-526) and index.

Part I: Planning and performing security assessements -- 1.Introduction to performing security assessments -- 2.Key principles of security -- 3.Using vulnerability scanning to assess network security-- 4.Conducting a penetration test -- 5.Performing IT security audits -- 6.Reporting your findings -- 7.Building and maintaining your secruity assessment skills -- Part II.Penetrration testing for nonintrusive attacks -- 8.Information reconnaissance -- 9.Host discovery using DNS and NetBIOS -- 10.Network and host discovery -- 11.Port scanning-- 12.Obtaining information from a host -- 13.War dialing, war driving, and bluetooth attacks -- Part III.Penetration testing for intrusive attacks -- 14.Automated vulnerability detection -- 15.Password attacks -- 16.Denial of service attacks -- 17.Application attacks -- 18.Database attacks -- 19.Networks sniffing -- 20.Spoofing -- 21.Session hijacking -- 22.How attackers avoid detection -- 23.Attackers using non-network methods to gain access -- Part IV.Security assessment case studie s-- 24.Web threats -- 25.E-mail threats -- 26.Domain controller threats -- 27.Extranet and VPN threats -- Part V.Appendixes. A. Checklists -- B.References.

System requirements for accompanying CD-ROM: Microsoft Windows XP or Windows 2000 or later.

Powered by Koha