欢迎来到天天文库
浏览记录
ID:39517345
大小:2.64 MB
页数:277页
时间:2019-07-05
《O'Reilly.Network.Security.Assessment -》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、ThisdocumentiscreatedwiththeunregisteredversionofDocument2PDFPilot.TableofContentsIndexReviewsReaderReviewsErrataAcademicNetworkSecurityAssessmentByChrisMcNabPublisher:O'ReillyPubDate:March2004ISBN:0-596-00611-XPages:396Slots:1.0NetworkSecurityAssessmentoffersanefficienttestingmo
2、delyoucanadopt,refine,andreusetocreateproactivedefensivestrategiestoprotectyoursystemsfromthethreatsthatareoutthere,aswellasthosestillbeingdeveloped.Thisthoroughandinsightfulguidecoversoffensivetechnologiesbygroupingandanalyzingthematahigherlevel--frombothanoffensiveanddefensivestandpoint-
3、-helpingadministratorsdesignanddeploynetworksthatareimmunetooffensiveexploits,tools,andscripts.ThisdocumentiscreatedwiththeunregisteredversionofDocument2PDFPilot.TableofContentsIndexReviewsReaderReviewsErrataAcademicNetworkSecurityAssessmentByChrisMcNabPublisher:O'Reill
4、yPubDate:March2004ISBN:0-596-00611-XPages:396Slots:1.0CopyrightForewordAboutBobAyersPrefaceRecognizedAssessmentStandardsHackersDefinedOrganizationAudienceMirrorSiteforToolsMentionedinThisBookUsingCodeExamplesConventionsUsedinThisBookCommentsandQuestionsAcknowledgmentsChapter1.NetworkSecuri
5、tyAssessmentSection1.1.TheBusinessBenefitsSection1.2.IP:TheFoundationoftheInternetSection1.3.ClassifyingInternet-BasedAttackersSection1.4.AssessmentServiceDefinitionsSection1.5.NetworkSecurityAssessmentMethodologySection1.6.TheCyclicAssessmentApproachChapter2.TheToolsRequiredSection2.1.The
6、OperatingSystemsSection2.2.FreeNetworkScanningToolsSection2.3.CommercialNetworkScanningToolsSection2.4.Protocol-DependentAssessmentToolsChapter3.InternetHostandNetworkEnumerationSection3.1.WebSearchEnginesThisdocumentiscreatedwiththeunregisteredversionofDocument2PDFPilot.Section3.2.NICQuer
7、yingSection3.3.DNSQueryingSection3.4.EnumerationTechniqueRecapSection3.5.EnumerationCountermeasuresChapter4.IPNetworkScanningSection4.1.ICMPProbingSection4.2.TCPPortScanningSection4.3.UDPPortScanningSection4.4.IDSEvasionandFilterCircumventionSection4.5.Low-Lev
此文档下载收益归作者所有