
Average Reviews:

(More customer reviews)Andrew Whitaker and Daniel Newman show how to protect a network by showing how to attack it. Penetration Testing and Network Defense, written for network security professionals, has strong disclosures that warn against the temptation to try some of the techniques taught in the book without written permission from those who own target systems. If you have been administering a network or consulting, you will already be familiar with much of the contents of the book. However, the book saves the reader the time of going many places to acquire all this information.
There are a few non-technical parts to the book. Chapter 4, Performing Social Engineering, should be ready by practically everyone who works with computers or lives in the information age for that matter. The authors almost had me thinking like a criminal. But this is a necessary exercise to stay one step ahead of the bad guys. Appendix A walks the reader through preparing a security policy.
Most of the book is written directly to those who already have a working knowledge of networking and the TCP/IP protocol. For over 10 chapters the authors cover many techniques for stealing data or taking down a network. The perspective of this guide flips flops from hacker to security administrator. Many new features in systems today are highlighted, such as Flood Defender for Cisco PIX firewall. All of the best tools are listed, both free and commercial, for evaluating the security of a network.
I give this guide five stars because it is easy to read and has excellent real world examples. I learned several new things and got some old questions answered. The book reinforces one of life's most important lessons I try to teach my kids. Respect other people: respect other people's things.
Click Here to see more reviews about: Penetration Testing and Network Defense
The practical guide to simulating, detecting, and responding to network attacksCreate step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacksPenetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.”–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®
Buy cheap Penetration Testing and Network Defense now.

No comments:
Post a Comment