Bild 1 von 1
![Test von Hackangriffen: So führen Sie Ihr eigenes Sicherheitsaudit durch [mit CDROM] - Bild 1 von 1](https://i.ebayimg.com/images/g/MIIAAOSwBiRZc0vH/s-l500.jpg)
Galerie
Bild 1 von 1
![Test von Hackangriffen: So führen Sie Ihr eigenes Sicherheitsaudit durch [mit CDROM] - Bild 1 von 1](https://i.ebayimg.com/images/g/MIIAAOSwBiRZc0vH/s-l500.jpg)
Ähnlichen Artikel verkaufen?
Test von Hackangriffen: So führen Sie Ihr eigenes Sicherheitsaud it durch [mit CDROM]
by Chirillo, John | PB | Acceptable
US $9,14
Ca.CHF 7,24
Artikelzustand:
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ”... Mehr erfahrenÜber den Artikelzustand
Akzeptabel
Buch mit deutlichen Gebrauchsspuren. Der Einband kann einige Beschädigungen aufweisen, ist aber in seiner Gesamtheit noch intakt. Die Bindung ist möglicherweise leicht beschädigt, in ihrer Gesamtheit aber noch intakt. In den Randbereichen wurden evtl. Notizen gemacht, der Text kann Unterstreichungen und Markierungen enthalten, es fehlen aber keine Seiten und es ist alles vorhanden, was für die Lesbarkeit oder das Verständnis des Textes notwendig ist. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Economy Shipping.
Standort: Aurora, Illinois, USA
Lieferung:
Lieferung zwischen Sa, 26. Jul und Mi, 30. Jul nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
Sicher einkaufen
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:376085569048
Artikelmerkmale
- Artikelzustand
- Akzeptabel
- Hinweise des Verkäufers
- Binding
- Paperback
- Book Title
- Hack Attacks Testing
- Weight
- 1 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780471229469
Über dieses Produkt
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471229466
ISBN-13
9780471229469
eBay Product ID (ePID)
2355905
Product Key Features
Number of Pages
560 Pages
Language
English
Publication Name
Hack Attacks Testing : How to Conduct Your Own Security Audit
Subject
Security / General
Publication Year
2003
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.2 in
Item Weight
30.3 Oz
Item Length
9.4 in
Item Width
7.4 in
Additional Product Features
Intended Audience
Trade
LCCN
2002-152542
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Acknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.
Synopsis
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more., Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
ThriftBooks
98,9% positive Bewertungen•19.7 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (5'686'002)
- s***n (577)- Bewertung vom Käufer.Letzter MonatBestätigter KaufThank You
- s***n (577)- Bewertung vom Käufer.Letzter MonatBestätigter KaufThank you
- a***c (340)- Bewertung vom Käufer.Letzter MonatBestätigter KaufGreat seller