Cargando…

Assessing network security /

Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques--straight from members of the Microsoft Security Team.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lam, Kevin
Otros Autores: LeBlanc, David, 1960-, Smith, Ben, 1975-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Redmond, Wash. : Microsoft Press, ©2004.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • pt. I. Planning and performing security assessments
  • 1. Introduction to performing security assessments
  • 2. Key principles of security
  • 3. Using vulnerability scanning to assess network security
  • 4. Conducting a penetration test
  • 5. Performing IT security audits
  • 6. Reporting your findings
  • 7. Building and maintaining your security assessment skills
  • pt. II. Penetration testing for nonintrusive attacks
  • 8. Information reconnaissance
  • 9. Host discovery using DNS and NetBIOS
  • 10. Network and host discovery
  • 11. Port scanning
  • 12. Obtaining information from a host
  • 13. War dialing, war driving, and bluetooth attacks
  • pt. III. Penetration testing for intrusive attacks
  • 14. Automated vulnerability detection
  • 15. Password attacks
  • 16. Denial of service attacks
  • 17. Application attacks
  • 18. Database attacks
  • 19. Network sniffing
  • 20. Spoofing
  • 21. Session hijacking
  • 22. How attackers avoid detection
  • 23. Attackers using non-network methods to gain access
  • pt. IV. Security assessment case studies
  • 24. Web threats
  • 25. E-mail threats
  • 26. Domain controller threats
  • 27. Extranet and VPN threats
  • pt. V. Appendixes.