Assessing network security / Kevin Lam, David LeBlanc, Ben Smith.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9780735620339 (pbk.) :
- 9780735620339
- 005.8 LAM
- TK5105.59.L36 .L36 2004
Item type | Current library | Call number | Vol info | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Long Loan | TUS: Midlands, Main Library Athlone General Lending | 005.8 LAM (Browse shelf(Opens below)) | 1 | Available | 219247 | |||
Long Loan | TUS: Midlands, Main Library Athlone CD | 005.8 LAM (Browse shelf(Opens below)) | CD 1185 | 1 | Available | 222812 |
Includes index.
CD-ROM in back pocket.
Includes bibliographical references (p. 515-526) and index.
Part I: Planning and performing security assessements -- 1.Introduction to performing security assessments -- 2.Key principles of security -- 3.Using vulnerability scanning to assess network security-- 4.Conducting a penetration test -- 5.Performing IT security audits -- 6.Reporting your findings -- 7.Building and maintaining your secruity assessment skills -- Part II.Penetrration testing for nonintrusive attacks -- 8.Information reconnaissance -- 9.Host discovery using DNS and NetBIOS -- 10.Network and host discovery -- 11.Port scanning-- 12.Obtaining information from a host -- 13.War dialing, war driving, and bluetooth attacks -- Part III.Penetration testing for intrusive attacks -- 14.Automated vulnerability detection -- 15.Password attacks -- 16.Denial of service attacks -- 17.Application attacks -- 18.Database attacks -- 19.Networks sniffing -- 20.Spoofing -- 21.Session hijacking -- 22.How attackers avoid detection -- 23.Attackers using non-network methods to gain access -- Part IV.Security assessment case studie s-- 24.Web threats -- 25.E-mail threats -- 26.Domain controller threats -- 27.Extranet and VPN threats -- Part V.Appendixes. A. Checklists -- B.References.
System requirements for accompanying CD-ROM: Microsoft Windows XP or Windows 2000 or later.