Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Penetration Testing and Cisco Network Defense
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Penetration Testing and Cisco Network Defense

Penetration Testing and Cisco Network Defense

Andrew Whitaker, Daniel Newman - Collection Networking Security

620 pages, parution le 20/12/2005

Résumé

The practical guide to simulating, detecting, and responding to network attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web server vulnerabilities
  • Detect attempts to breach database security
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.

Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.

Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.

Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.

L'auteur - Andrew Whitaker

Andrew Whitaker, CCSP, is the Director of Enteprise InfoSec and Networking for TechTrain, where he performs penetration tests and teaches ethical hacking and Cisco courses. He has been working in the IT industry for more than 10 years, specializing in Cisco and security technologies, and has performed penetration tests for numerous financial institutions and Fortune 500 companies.

L'auteur - Daniel Newman

Daniel P. Newman, CISSP, CCSP, has been in the computer industry for over 12 years specializing in application programming, database design, and network security for projects all over the world. He is the managing director and chief security officer for Tribal Knowledge Security and specializes in penetration testing and advanced technical training in Cisco, Microsoft, and Ethical Hacking topics.

Sommaire

  • Part I Overview of Penetration Testing
    • Understanding Penetration Testing
    • Legal and Ethical Considerations
    • Creating a Test Plan
  • Part II Performing the Test
    • Performing Social Engineering
    • Performing Host Reconnaissance
    • Understanding and Attempting Session Hijacking
    • Performing Web Server Attacks
    • Performing Database Attacks
    • Password Cracking
    • Attacking the Network
    • Scanning and Penetrating Wireless Networks
    • Using Trojans and Backdoor Applications
    • Penetrating UNIX, Microsoft, and Novell Servers
    • Understanding and Attempting Buffer Overflows
    • Denial-of-Service Attacks
    • Case Study: A Methodical Step-By-Step Penetration Test
  • Part III Appendixes
    • Appendix APreparing a Security Policy
    • Appendix BTools
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Cisco Press
Auteur(s) Andrew Whitaker, Daniel Newman
Collection Networking Security
Parution 20/12/2005
Nb. de pages 620
Format 19 x 23
Couverture Broché
Poids 1020g
Intérieur Noir et Blanc
EAN13 9781587052088
ISBN13 978-1-58705-208-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription