Description |
1 online resource (xxi, 373 pages) : illustrations |
|
text file |
Note |
Includes index. |
Bibliography |
Includes bibliographical references (pages 354-355) and index. |
Contents |
1. Network security assessment -- 2. tools required -- 3. Internet host and network enumeration -- 4. IP network scanning -- 5. Assessing remote information services -- 6. Assessing web services -- 7. Assessing remote maintenance services -- 8. Assessing FTP and database services -- 9. Assessing Windows networking services -- 10. Assessing email services -- 11. Assessing IP VPN services -- 12. Assessing Unix RPC services -- 13. Application-level risks -- 14. Example assessment methodology -- A. TCP, UPD ports, and ICMP message types. |
Summary |
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becomin. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Reproduction |
Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Subject |
Computers -- Access control -- Evaluation.
|
|
Computer networks -- Security measures -- Evaluation.
|
|
Ordinateurs -- Accès -- Contrôle -- Évaluation. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Évaluation. |
|
Computers -- Access control -- Evaluation |
Indexed Term |
Security |
Added Title |
Network security: assessment of information systems |
|
Network security and assessment |
Other Form: |
Print version: McNab, Chris (Chris R.), 1980- Network Security Assessment. 1st ed. Sebastopol, CA : O'Reilly Media, Inc., 2004 059600611X (OCoLC)55001981 |
ISBN |
9780596520809 (electronic bk.) |
|
0596520808 (electronic bk.) |
|
9780596552558 |
|
0596552556 |
Standard No. |
059600611X |
|