Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
Excellent starting place for security evaluation training
Published by Thriftbooks.com User , 21 years ago
John Chirillo routinely stuffs his books with a wide variety of hard to find technical gems. This book is no exception as he has created an exceptional manual on security auditing. His compilation of tools is excellent and the book descriptions and how-to's, even better. For those that are inclined, he outlines the building of a Tiger Box (testing system) which takes full advantage of the tools contained on the CDROM. The head to head comparisons of the popular security tools help you in selecting the security tool that is right for you. If you are playing catch up in the mad-cap world of Internet security, this book can help you level the playing field. The CDROM also contains the highly functional Tiger Tools Suite which takes the difficult job of security testing to the level of simple mouse clicks. This is a good book to break in a beginner and is full of information to satisfy the security veteran.
Good Beginner Guide to Vulnerability Assessments
Published by Thriftbooks.com User , 21 years ago
I enjoyed the detail in this book and the configurations are technically sound. The author covered the best known software with clear instructions on getting up and running and then performing an audit with each package. The book closes with an interesting evaluation ranking chart and compares each package based on number of issues detected. The text is easy to follow and formatted well. This is a good beginner guide to vulnerability assessments (veterans need not apply).
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.