How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future.
* Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA)
* Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server
* Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services
* IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs
* Unix RPC services on Linux, Solaris, IRIX, and other platforms
* Various types of application-level vulnerabilities that hacker tools and scripts exploit
Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
http://rapidshare.com/files/111660752/o
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
-
▼
March 2009
(40)
- Web Dragons: Inside the Myths of Search Engine
- Mathematics for Algorithm and Systems Analysis
- Javascript The Definitive Guide 5th Edition
- Brute Force: Cracking the Data Encryption Standard
- Operating Systems Design and Implementation
- Access Denied
- Exploiting Software: How to Break Code
- The Ethical Hack: A Framework for Business Value
- Create your own linux distribution
- Fuzzing: Brute Force Vulnerability Discovery
- Principles of Computer Science
- Pro Decrypting VBScript Viruses
- Learn-Key's Hacking Revealed
- Hacking Exposed Wireless
- Assembly Language Step-By-Step
- Professional JavaScript for Web Developers
- Network Security Assessment
- Advanced Linux Programming
- Introduction to Computing and Programming wit Java
- Hacking the Cable Modem
- Hacking the Cable Modem
- Java Cryptography Extensions:Practical Guide
- Internet and the World Wide Web: How to Program
- IPSec, 2nd Edition
- Understanding the Linux Kernel
- Software Piracy Exposed
- Computer Security Art And Science
- Network Security: A Beginner's Guide
- Code Reading: The Open Source Perspective
- 5 C Programming eBooks
- The Invisible Web
- MYSQL Books
- Reverse Engineering Code with IDA Pro
- Forensic Computing A Practitioner’s Guide
- Network Security Tools
- XML Books
- Internet Denial of Service: Attack and Defense
- Practical Internet Security
- Ankit Fadia ebooks
- Offensive Security Tutorial Videos...zone
- ► February 2009 (17)
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment