Penetration Testing and Network Defense Penetration Testing and Network Defense
Networking Technology

Penetration Testing and Network Defense

    • 59,99 €
    • 59,99 €

Beschreibung des Verlags

The practical guide to simulating, detecting, and responding to network attacks 
Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks
Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.

Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.

Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.

Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.

“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.”

–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®

GENRE
Computer und Internet
ERSCHIENEN
2005
31. Oktober
SPRACHE
EN
Englisch
UMFANG
624
Seiten
VERLAG
Pearson Education
ANBIETERINFO
Pearson Education Limited
GRÖSSE
45,1
 MB
CEH Certified Ethical Hacker Cert Guide CEH Certified Ethical Hacker Cert Guide
2022
CompTIA PenTest+ PT0-002 Cert Guide CompTIA PenTest+ PT0-002 Cert Guide
2021
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
2023
Certified Ethical Hacker (CEH) Exam Cram Certified Ethical Hacker (CEH) Exam Cram
2022
The Core of Hacking The Core of Hacking
2020
Ethical Hacking and Penetration Testing Guide Ethical Hacking and Penetration Testing Guide
2017
Einstein’s Struggles with Quantum Theory Einstein’s Struggles with Quantum Theory
2007
Balance Your Plate Challenge Balance Your Plate Challenge
2025
Heart Whispers Beneath Starlit Prayer Skies Heart Whispers Beneath Starlit Prayer Skies
2025
Hallowed Journeys of Global Stories Hallowed Journeys of Global Stories
2025
Lessons of Benevolent Bee Lessons of Benevolent Bee
2025
Physicists of Ireland Physicists of Ireland
2003
NX-OS and Cisco Nexus Switching NX-OS and Cisco Nexus Switching
2013
Cisco LAN Switching Configuration Handbook Cisco LAN Switching Configuration Handbook
2009
IPv6 for Enterprise Networks IPv6 for Enterprise Networks
2011
Designing and Deploying 802.11 Wireless Networks Designing and Deploying 802.11 Wireless Networks
2015
100 Principles of Game Design 100 Principles of Game Design
2012
PM Crash Course for IT Professionals PM Crash Course for IT Professionals
2005