Hack Attacks Testing_ How To Conduct Your Own Security Audit.pdf

(9792 KB) Pobierz
TE
Team-Fly
®
AM
FL
Y
The
Dear Valued Customer,
WILEY
advantage
We realize you’re a busy professional with deadlines to hit. Whether your goal is to learn a new
technology or solve a critical problem, we want to be there to lend you a hand. Our primary objective
is to provide you with the insight and knowledge you need to stay atop the highly competitive and ever-
changing technology industry.
Wiley Publishing, Inc., offers books on a wide variety of technical categories, including security, data
warehousing, software development tools, and networking—everything you need to reach your peak.
Regardless of your level of expertise, the Wiley family of books has you covered.
• For Dummies—The
fun
and
easy
way to learn
• The Weekend Crash Course—The
fastest
way to learn a new tool or technology
• Visual—For those who prefer to learn a new topic
visually
• The Bible—The
100% comprehensive
tutorial and reference
• The Wiley Professional list—Practical and
reliable
resources for IT professionals
The book you hold now,
Hack Attacks Testing: How to Conduct Your Own Security Audit,
allows you to
perform your own security audit by providing step-by-step guidance on how to build and operate
a security analysis/monitoring system. Covering both Windows and UNIX—in a dual boot
configuration—the book covers building and operating your own vulnerability analysis system, using
only the top-quality tools available today. You’ll find these tools on the book’s CD-ROM. This book will
be very valuable to anyone who needs to regularly conduct network security audits while staying within
a limited budget.
Our commitment to you does not end at the last page of this book. We’d want to open a dialog with you
to see what other solutions we can provide. Please be sure to visit us at www.wiley.com/compbooks to
review our complete title list and explore the other resources we offer. If you have a comment,
suggestion, or any other inquiry, please locate the “contact us” link at www.wiley.com.
Finally, we encourage you to review the following page for a list of Wiley titles on related topics.
Thank you for your support and we look forward to hearing from you and serving your needs again
in the future.
Sincerely,
Richard K. Swadley
Vice President & Executive Group Publisher
Wiley Technology Publishing
more information
on related titles
The Next Level of Hack Attacks Testing
Available from Wiley Publishing
INTERMEDIATE/ADVANCED
Chirillo/Hack
Attacks Denied 2E
0471232831
Design and fortify
networks against
the latest attacks
Chirillo/Hack Attacks
Revealed, 2E
0471232823
See network
security through the
hacker’s eye
Chirillo/Hack
Attacks
Encyclopedia
0471055891
A complete library
of the texts, files,
and code used by
hackers
Schweitzer/Securing
the Network from
Malicious Code
0764549588
Inoculate your
network against
viruses, worms, and
Trojans
BEGINNER
Hines/Planning for
Survivable
Networks
047123284X
Keep your network
safe from security
disasters with a
dependable
recovery strategy
Crothers/
Implementing
Intrusion Detection
Systems
0764549499
A hands-on guide
for securing the
network
Available at your favorite bookseller or visit www.wiley.com/compbooks
Hack Attacks Testing
How to Conduct Your
Own Security Audit
Zgłoś jeśli naruszono regulamin