Hack Attacks Testing: How to Conduct Your OwnSecurity Audit
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Hack Attacks Testing: How to Conduct Your OwnSecurity Audit

English

JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

English

Acknowledgments.

Introduction.

PART 1: BUILDING A MULTISYSTEM TIGER BOX.

Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration.

Chapter 2. Basic Linux and Solaris Installations and Configurations.

Chapter 3. Mac OS X Tiger Box Solutions.

Chapter 4. Installing and Configuring a Testing Target.

PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM.

Chapter 5. Cerberus Internet Scanner.

Chapter 6. CyberCop Scanner.

Chapter 7. Internet Scanner.

Chapter 8. Security Threat Avoidance Technology Scanner.

Chapter 9. TigerSuite 4.0.

PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X.

Chapter 10. hping/2.

Chapter 11. Nessus Security Scanner.

Chapter 12. Nmap.

Chapter 13. SAINT.

Chapter 14. SARA.

PART 4: VULNERABILITY ASSESSMENT .

Chapter 15. Comparative Analysis.

Appendix A. Linux/Unix Shortcuts and Commands.

Appendix B. What's on the CD-ROM.

Index.

loading