Cargando…

Practical Network Scanning : Capture network vulnerabilities using standard tools such as Nmap and Nessus.

Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cox, Jacob
Otros Autores: Singh., Ajay
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1038480785
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180602s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d NLE  |d OCLCQ  |d UKMGB  |d OCLCO  |d LVT  |d OCLCF  |d UKAHL  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB898006  |2 bnb 
016 7 |a 018882498  |2 Uk 
020 |a 9781788832496 
020 |a 1788832493 
020 |z 9781788839235 
029 1 |a UKMGB  |b 018882498 
029 1 |a AU@  |b 000067093495 
035 |a (OCoLC)1038480785 
037 |a 9781788832496  |b Packt Publishing 
050 4 |a TK5105.5  |b .C69 2018eb 
082 0 4 |a 004.6  |2 23 
049 |a UAMI 
100 1 |a Cox, Jacob. 
245 1 0 |a Practical Network Scanning :  |b Capture network vulnerabilities using standard tools such as Nmap and Nessus. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (316 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Fundamental Security Concepts; Why security?; Building blocks of information security; Computer security; Network security; Firewalls; Intrusion detection systems / intrusion prevention systems; Multitier topology; Internet security; Password; System upgrade and updates; Phishing; Beware of phishing phone calls; Phishing protection; Security issues, threats, and attacks; IoT security risk; Computer security risk; Security Risk-Border Gateway Protocol; Security and threats. 
505 8 |a Natural disastersHuman threats; Security vulnerabilities; Technology weaknesses; Configuration weaknesses ; Security policy weaknesses; Using unencrypted or weak encryption for a website; Summary; Questions; Further reading; Chapter 2: Secure Network Design; Access control ; Asset classification and physical security; Authentication, authorization, and accounting; Network management and security design; Network segmentation; Segmentation strategy steps; Network protection consideration and design; Hardening your TCP/IP stack; DoS and DDoS attacks ; Volume-based attacks. 
505 8 |a Application layer attacksLow-rate attacks; IP spoofing; Anti-spoofing using access lists; Encryption; Anti-spoofing using RPF checks; Ping sweeps and Port scans; Mitigation; DNS vulnerabilities ; How does DNS work?; DNS protocol attacks; Mitigation; Two factor authentication; Summary ; Questions; Further reading; Chapter 3: Server-Level Security; Classification of data; Physical security ; Disk encryption; Full-disk encryption; Bitlocker; Virtual Trusted Platform Module -- vTPM ; Encrypt your Hyper-V Guest VMs ; Cloud VM disk encryption; What is encryption at rest?; Hardening server security. 
505 8 |a Check for open ports or servicesSystem firewall configuration; System update; Disable USB; Hard disk encryption; BIOS protection; Check the installed packages; Password policies; Secure and encrypt remote access; Implement activity logging; Document the host information; Authentication NTLM versus Kerberos; Password policies; Server-level permissions; Server antivirus and malware protection; Local security policies; Summary; Questions; Further reading; Chapter 4: Cloud Security Design; Cloud offerings; IaaS; PaaS; SaaS; Public versus private; Public IaaS versus private IaaS. 
505 8 |a Public PaaS versus private PaaSPublic SaaS versus private SaaS; Shared technology and shared danger; Security approach for cloud computing; Traditional enterprise network model; Hybrid data center and cloud network; Network security devices for IaaS; Firewall Virtual Appliance; Virtual TAP vTAP; Virtual Router; Virtual web application firewalls; DDoS attack protection; Data loss prevention; Exploited system vulnerabilities; Summary ; Questions; Further reading; Chapter 5: Application Security Design; GDPR; Getting consent; Access to data; Encryption; SQL Injection. 
500 |a Prevention of SQL Injection attack on web applications. 
520 |a Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the ... 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Monitoring  |x Computer programs. 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 6 |a Réseaux d'ordinateurs  |x Surveillance  |x Logiciels. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Logiciels. 
650 7 |a Computer networks  |x Security measures  |x Computer programs  |2 fast 
700 1 |a Singh., Ajay. 
776 0 8 |i Print version:  |a Cox, Jacob.  |t Practical Network Scanning : Capture network vulnerabilities using standard tools such as Nmap and Nessus.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5400400  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0036875496 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5400400 
994 |a 92  |b IZTAP