Description |
1 online resource (xxix, 553 pages) : illustrations |
Bibliography |
Includes bibliographical references (pages 515-526) and index. |
Contents |
pt. I. Planning and performing security assessments -- 1. Introduction to performing security assessments -- 2. Key principles of security -- 3. Using vulnerability scanning to assess network security -- 4. Conducting a penetration test -- 5. Performing IT security audits -- 6. Reporting your findings -- 7. Building and maintaining your security assessment skills -- pt. II. Penetration testing for nonintrusive attacks -- 8. Information reconnaissance -- 9. Host discovery using DNS and NetBIOS -- 10. Network and host discovery -- 11. Port scanning -- 12. Obtaining information from a host -- 13. War dialing, war driving, and bluetooth attacks -- pt. III. Penetration testing for intrusive attacks -- 14. Automated vulnerability detection -- 15. Password attacks -- 16. Denial of service attacks -- 17. Application attacks -- 18. Database attacks -- 19. Network sniffing -- 20. Spoofing -- 21. Session hijacking -- 22. How attackers avoid detection -- 23. Attackers using non-network methods to gain access -- pt. IV. Security assessment case studies -- 24. Web threats -- 25. E-mail threats -- 26. Domain controller threats -- 27. Extranet and VPN threats -- pt. V. Appendixes. |
Summary |
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques--straight from members of the Microsoft Security Team. |
Subject |
Computer networks -- Security measures.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer networks -- Security measures |
Added Author |
LeBlanc, David, 1960-
|
|
Smith, Ben, 1975-
|
Other Form: |
Print version: Lam, Kevin. Assessing network security. Redmond, Wash. : Microsoft Press, ©2004 0735620334 (DLC) 2004049997 (OCoLC)55019348 |
ISBN |
9780735635777 (electronic bk.) |
|
0735635773 (electronic bk.) |
|
(pbk.) |
|