Network Security Assessment

Network Security Assessment

Book - 2008
Rate this:
Ingram Book Company
This thorough and insightful guide covers security technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--to help administrators design and deploy security assessment networks.

Ingram Publishing Services
This thorough and insightful guide covers security technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--to help administrators design and deploy security assessment networks.

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.

Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future.

Network Security Assessment helps you assess:

  • Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA)


  • Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server


  • Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services


  • SMTP, POP3, and IMAP email services


  • IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs


  • Unix RPC services on Linux, Solaris, IRIX, and other platforms


  • Various types of application-level vulnerabilities that hacker tools and scripts exploit


Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.


Blackwell North Amer
Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high level. You'll learn to create defensive strategies against entire attack categories, providing protection now and into the future.
Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

Publisher: Sebastopol, Calif. : O'Reilly Media, c2008
Edition: 2nd ed
Description: xxiv, 478 p. : ill. ; 24 cm
ISBN: 9780596510305
0596510306
Branch Call Number: 005.8 McN

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Subject Headings

  Loading...

Find it at BPL

  Loading...
[]
[]
To Top