本文共 1879 字,大约阅读时间需要 6 分钟。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp *The practical guide to assessing network vulnerabilities andmanaging security risk. *Assess your network's defensive strengths and eliminatevulnerabilities with proven internal testing methodologies *Learn how to perform simulated attacks on live networks *Detect network attacks using the Cisco Intrusion DetectionSensor and Security Agent *A complete real-world case study shows a step-by-step processfor conducting your own penetration testsSecurity threats are on the rise, and companies must be preparedto face them. One way companies are assessing security risk and thevulnerability of their networks is by hiring security firms toattempt to penetrate their networks or by developing in-housepenetration testing skills to continually monitor networkvulnerabilities. Penetration testing is a growing field, yet thereis no definite resource on how to perform a penetration test andthe ethics of testing. Penetration Testing and Cisco NetworkDefense offers detailed steps on how to emulate an outsideattacker to assess the security of a network. Unlike other books onhacking, this book is specifically geared toward penetrationtesting. Divided into two parts, this book provides a set ofguidelines and methodologies for understanding and performinginternal penetration tests. It also shows how an attack can bedetected on a network. Part one covers understanding penetrationtesting, assessing risks, and creating a testing plan. Part twofocuses on the particulars of testing, and each chapter includesthree essential components: the steps to perform a simulated attackusing popular commercial and open-source applications; how todetect the attack with Cisco Intrusion Detection Sensor andSecurity Agent; suggestions on how to harden a system againstattacks.
http://rapidshare.com/files/52597423/1587052083.zip