Assessing network security /
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques--straight from members of the Microsoft Security Team.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Redmond, Wash. :
Microsoft Press,
©2004.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Planning and performing security assessments
- 1. Introduction to performing security assessments
- 2. Key principles of security
- 3. Using vulnerability scanning to assess network security
- 4. Conducting a penetration test
- 5. Performing IT security audits
- 6. Reporting your findings
- 7. Building and maintaining your security assessment skills
- pt. II. Penetration testing for nonintrusive attacks
- 8. Information reconnaissance
- 9. Host discovery using DNS and NetBIOS
- 10. Network and host discovery
- 11. Port scanning
- 12. Obtaining information from a host
- 13. War dialing, war driving, and bluetooth attacks
- pt. III. Penetration testing for intrusive attacks
- 14. Automated vulnerability detection
- 15. Password attacks
- 16. Denial of service attacks
- 17. Application attacks
- 18. Database attacks
- 19. Network sniffing
- 20. Spoofing
- 21. Session hijacking
- 22. How attackers avoid detection
- 23. Attackers using non-network methods to gain access
- pt. IV. Security assessment case studies
- 24. Web threats
- 25. E-mail threats
- 26. Domain controller threats
- 27. Extranet and VPN threats
- pt. V. Appendixes.