|
| Título : |
Penetration Testing and Network Defense. : the practical guide to simulating, detecting, and responding to network attacks. |
| Tipo de documento: |
texto impreso |
| Autores: |
Inc. Cisco Systems, Autor |
| Mención de edición: |
1a ed. |
| Editorial: |
Cisco Press |
| Fecha de publicación: |
2006 |
| Número de páginas: |
xxvii, 624 p. |
| Il.: |
ils.; grafs.; cuads. |
| Dimensiones: |
23.2 cm. |
| ISBN/ISSN/DL: |
978-1-58705-208-8 |
| Nota general: |
Include Appendixes, Preparing a security policy, Tools, Glosary, Index. |
| Idioma : |
Inglés (eng) |
| Clasificación: |
627.130285 Canales. Procesamiento de datos Aplicaciones de computador |
| Nota de contenido: |
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test. |
| Link: |
https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=90494 |
Penetration Testing and Network Defense. : the practical guide to simulating, detecting, and responding to network attacks. [texto impreso] / Inc. Cisco Systems, Autor . - 1a ed. . - Cisco Press, 2006 . - xxvii, 624 p. : ils.; grafs.; cuads. ; 23.2 cm. ISBN : 978-1-58705-208-8 Include Appendixes, Preparing a security policy, Tools, Glosary, Index. Idioma : Inglés ( eng)
| Clasificación: |
627.130285 Canales. Procesamiento de datos Aplicaciones de computador |
| Nota de contenido: |
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test. |
| Link: |
https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=90494 |
Penetration Testing and Network Defense.
Cisco Systems, Inc. -
Estados Unidos : Cisco Press - 2006
Include Appendixes, Preparing a security policy, Tools, Glosary, Index.
Understanding penetration testing -- Legal and ethical consideration -- Creating and test plan -- performin the test -- Performing social engineering -- performing host reconnaissannce -- Understanding and attempting -- Session hijacking -- Performing web server attacks -- Performing database attacks -- Password cracking -- attacking the network -- Scanning and penetrating wireless networks -- Using trojans and backdoor aplications -- penetrating UNIX, Microsoft, and Novell Servers -- understanding and attempting buffer overflows -- denial-of-service attacks -- Case Study: A METHODICAL step-by-step penetration test.
|
|  |