買這商品的人也買了...
-
$550$435 -
$650$514 -
$880$695 -
$720$612 -
$560$448 -
$550$468 -
$590$466 -
$590$466 -
$480$408 -
$680$578 -
$580$493 -
$750$638 -
$560$476 -
$550$468 -
$490$417 -
$480$408 -
$650$637 -
$650$553 -
$280$218 -
$480$379 -
$750$638 -
$720$569 -
$780$616 -
$620$527 -
$280$221
相關主題
商品描述
Learn how to conduct thorough security examinations via illustrations and
virtual simulations
A network security breach (a hack, crack, or other
invasion) occurs when unauthorized access to the network is achieved and havoc
results. The best possible defense is an offensive strategy that allows you to
regularly test your network to reveal the vulnerabilities and close the holes
before someone gets in. Written by veteran author and security expert John
Chirillo, Hack Attacks Testing explains how to perform your own security
audits.
Step by step, the book covers how-to drilldowns for installing and
configuring your Tiger Box operating systems, installations, and configurations
for some of the most popular auditing software suites. In addition, it includes
both common and custom usages, scanning methods, and reporting routines of each.
Finally, Chirillo inspects the individual vulnerability scanner results and
compares them in an evaluation matrix against a select group of intentional
security holes on a target network. Chirillo tackles such topics as:
*
Building a multisystem Tiger Box
* Basic Windows 2000 Server installation and
configuration for auditing
* Basic Linux and Solaris installation and
configuration
* Basic Mac OS X installation and configuration for
auditing
* ISS, CyberCop, Nessus, SAINT, and STAT scanners
* Using
security analysis tools for Mac OS X
* Vulnerability assessment
Bonus
CD!
The CD contains virtual simulations of scanners, ISS Internet Scanner
evaluation version, and more.
Table of Contents
Acknowledgments.
Introduction.
PART 1: BUILDING A MULTISYSTEM TIGER BOX.
Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration.
Chapter 2. Basic Linux and Solaris Installations and Configurations.
Chapter 3. Mac OS X Tiger Box Solutions.
Chapter 4. Installing and Configuring a Testing Target.
PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM.
Chapter 5. Cerberus Internet Scanner.
Chapter 6. CyberCop Scanner.
Chapter 7. Internet Scanner.
Chapter 8. Security Threat Avoidance Technology Scanner.
Chapter 9. TigerSuite 4.0.
PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X.
Chapter 10. hping/2.
Chapter 11. Nessus Security Scanner.
Chapter 12. Nmap.
Chapter 13. SAINT.
Chapter 14. SARA.
PART 4: VULNERABILITY ASSESSMENT .
Chapter 15. Comparative Analysis.
Appendix A. Linux/Unix Shortcuts and Commands.
Appendix B. What's on the CD-ROM.
Index.
商品描述(中文翻譯)
學習如何透過插圖和虛擬模擬進行徹底的安全檢查。當未經授權的訪問成功進入網絡並造成混亂時,就會發生網絡安全漏洞(駭客攻擊、破解或其他入侵)。最佳的防禦策略是採取主動的方式,定期測試您的網絡,以揭示漏洞並在有人進入之前修補這些漏洞。這本書由資深作者和安全專家 John Chirillo 撰寫,名為《Hack Attacks Testing》,解釋了如何執行自己的安全審計。這本書逐步介紹了如何安裝和配置您的 Tiger Box 操作系統,以及一些最受歡迎的審計軟體套件的安裝和配置。此外,它還包括每個軟體的常見和自定義用法、掃描方法和報告例程。最後,Chirillo 檢查各個漏洞掃描器的結果,並將其與目標網絡上選定的安全漏洞進行比較,形成評估矩陣。Chirillo 涉及的主題包括:
* 建立多系統 Tiger Box
* 基本的 Windows 2000 Server 安裝和配置以進行審計
* 基本的 Linux 和 Solaris 安裝和配置
* 基本的 Mac OS X 安裝和配置以進行審計
* ISS、CyberCop、Nessus、SAINT 和 STAT 掃描器
* 用於 Mac OS X 的安全分析工具
* 漏洞評估
附贈 CD!這張 CD 包含掃描器的虛擬模擬、ISS Internet Scanner 評估版本等。
目錄
致謝
引言
第一部分:建立多系統 Tiger Box
第 1 章 基本的 Windows 2000/Windows 2000 Server 安裝和配置
第 2 章 基本的 Linux 和 Solaris 安裝和配置
第 3 章 Mac OS X Tiger Box 解決方案
第 4 章 安裝和配置測試目標
第二部分:為您的 Windows 基礎 Tiger Box 操作系統使用安全分析工具
第 5 章 Cerberus Internet Scanner
第 6 章 CyberCop Scanner
第 7 章 Internet Scanner
第 8 章 安全威脅避免技術掃描器
第 9 章 TigerSuite 4.0
第三部分:為 *NIX 和 Mac OS X 使用安全分析工具
第 10 章 hping/2
第 11 章 Nessus 安全掃描器
第 12 章 Nmap
第 13 章 SAINT
第 14 章 SARA
第四部分:漏洞評估
第 15 章 比較分析
附錄 A Linux/Unix 快捷鍵和命令
附錄 B CD-ROM 上的內容
索引