Rights Contact Login For More Details
More About This Title Hack Attacks Testing: How to Conduct Your OwnSecurity Audit
- English
English
- English
English
Introduction.
PART 1: BUILDING A MULTISYSTEM TIGER BOX.
Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration.
Chapter 2. Basic Linux and Solaris Installations and Configurations.
Chapter 3. Mac OS X Tiger Box Solutions.
Chapter 4. Installing and Configuring a Testing Target.
PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM.
Chapter 5. Cerberus Internet Scanner.
Chapter 6. CyberCop Scanner.
Chapter 7. Internet Scanner.
Chapter 8. Security Threat Avoidance Technology Scanner.
Chapter 9. TigerSuite 4.0.
PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X.
Chapter 10. hping/2.
Chapter 11. Nessus Security Scanner.
Chapter 12. Nmap.
Chapter 13. SAINT.
Chapter 14. SARA.
PART 4: VULNERABILITY ASSESSMENT .
Chapter 15. Comparative Analysis.
Appendix A. Linux/Unix Shortcuts and Commands.
Appendix B. What's on the CD-ROM.
Index.