Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Attacks Testing: How to Conduct Your Own Security Audit

Buy
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.

Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as:

  • Building a multisystem Tiger Box
  • Basic Windows 2000 Server installation and configuration for auditing
  • Basic Linux and Solaris installation and configuration
  • Basic Mac OS X installation and configuration for auditing
  • ISS, CyberCop, Nessus, SAINT, and STAT scanners
  • Using security analysis tools for Mac OS X
  • Vulnerability assessment

Bonus CD!

The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.

About the Author
JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

(HTML tags aren't allowed.)

Analytically Tractable Stochastic Stock Price Models (Springer Finance)
Analytically Tractable Stochastic Stock Price Models (Springer Finance)

Asymptotic analysis of stochastic stock price models is the central topic of the present volume. Special examples of such models are stochastic volatility models, that have been developed as an answer to certain imperfections in a celebrated Black-Scholes model of option pricing. In a stock price model with stochastic volatility, the random...

AOP in .NET: Practical Aspect-Oriented Programming
AOP in .NET: Practical Aspect-Oriented Programming

Summary

AOP in .NET introduces aspect-oriented programming to .NET developers and provides practical guidance on how to get the most benefit from this technique in your everyday coding. The book's many examples concentrate on modularizing non-functional requirements that often sprawl...
Practical Genetic Algorithms
Practical Genetic Algorithms

"The first introductory-level book to emphasize practical applications through the use of example problems."
–– International Journal of General Systems, Vol. 31, No. 1, 2002, on the first edition

The use of genetic algorithms (GAs) to solve large and often complex computational problems has given rise...


Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
An in-depth look at the lives and occult practices of 12 influential practitioners of sex magic from the 19th century to the present day

• Explores the background and sexual magical beliefs of Paschal Beverly Randolph, Ida Craddock, Aleister Crowley, Maria de Naglowska, Austin Osman Spare, Julius Evola, Franz Bardon,
...
Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)
Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)

This comprehensive account of the deadliest Ebola outbreak in history examines its devastating effects on West Africa’s most vulnerable populations: pregnant women and children. Noted experts across disciplines assess health care systems’ responses to the epidemic in Liberia, Guinea, and Sierra Leone, emphasizing key...

Five Modes of Scepticism: Sextus Empiricus and the Agrippan Modes (Oxford Philosophical Monographs)
Five Modes of Scepticism: Sextus Empiricus and the Agrippan Modes (Oxford Philosophical Monographs)
Five Modes of Scepticism examines the argument forms that lie at the heart of Pyrrhonian scepticism as expressed in the writings of Sextus Empiricus. These are the Agrippan modes of disagreement, hypothesis, infinite regression, reciprocity and relativity; modes which are supposed to bring about that quintessentially sceptical...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy