Título : |
Penetration Testing and Network Defense. : the practical guide to simulating, detecting, and responding to network attacks. |
Tipo de documento: |
texto impreso |
Autores: |
Inc. Cisco Systems, Autor |
Mención de edición: |
1a ed. |
Editorial: |
Cisco Press |
Fecha de publicación: |
2006 |
Número de páginas: |
xxvii, 624 p. |
Il.: |
ils.; grafs.; cuads. |
Dimensiones: |
23.2 cm. |
ISBN/ISSN/DL: |
978-1-58705-208-8 |
Nota general: |
Include Appendixes, Preparing a security policy, Tools, Glosary, Index. |
Idioma : |
Inglés (eng) |
Clasificación: |
|
Nota de contenido: |
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test. |
Link: |
https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=90494 |
Penetration Testing and Network Defense. : the practical guide to simulating, detecting, and responding to network attacks. [texto impreso] / Inc. Cisco Systems, Autor . - 1a ed. . - Cisco Press, 2006 . - xxvii, 624 p. : ils.; grafs.; cuads. ; 23.2 cm. ISBN : 978-1-58705-208-8 Include Appendixes, Preparing a security policy, Tools, Glosary, Index. Idioma : Inglés ( eng)
Clasificación: |
|
Nota de contenido: |
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test. |
Link: |
https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=90494 |
Penetration Testing and Network Defense.
Cisco Systems, Inc. -
Estados Unidos : Cisco Press - 2006
Include Appendixes, Preparing a security policy, Tools, Glosary, Index.
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test.
|
| |