|Listed in category:
Have one to sell?

Hack Attacks Testing: How to Conduct Your Own Security Audit [With CDROM]

by Chirillo, John | PB | Acceptable
ThriftBooks
(3932681)
Registered as a business seller
US $9.14
Approximately£6.77
Condition:
Acceptable
Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ... Read moreAbout condition
Breathe easy. Free postage and returns.
Hurry before it's gone. 1 person is watching this item.
Postage:
Free Economy Shipping.
Estimated between Fri, 25 Jul and Wed, 30 Jul to 94104
Estimated delivery dates - opens in a new window or tab reflect seller's dispatch time, origin postcode, destination postcode and time of order receipt, and will depend on the delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods, and are an estimate only.
Located in: Aurora, Illinois, United States
Returns:
30 days return. Seller pays for return postage.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:376085569048
Last updated on 22 Jul, 2025 04:43:05 BSTView all revisionsView all revisions

Item specifics

Condition
Acceptable
A book with obvious wear. May have some damage to the book cover but the book is still completely intact. The binding may be slightly damaged around the edges but it is still completely intact. May have some underlining and highlighting of text and some writing in the margins, but there are no missing pages or anything else that would compromise the readability or legibility of the text. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller notes
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ...
Binding
Paperback
Book Title
Hack Attacks Testing
Weight
1 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9780471229469

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471229466
ISBN-13
9780471229469
eBay Product ID (ePID)
2355905

Product Key Features

Number of Pages
560 Pages
Language
English
Publication Name
Hack Attacks Testing : How to Conduct Your Own Security Audit
Subject
Security / General
Publication Year
2003
Type
Textbook
Subject Area
Computers
Author
John Chirillo
Format
Trade Paperback

Dimensions

Item Height
1.2 in
Item Weight
30.3 Oz
Item Length
9.4 in
Item Width
7.4 in

Additional Product Features

Intended Audience
Trade
LCCN
2002-152542
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Acknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.
Synopsis
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more., Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
LC Classification Number
QA76.9.A25

Item description from the seller

Seller business information

I certify that all my selling activities will comply with all EU laws and regulations.
About this seller

ThriftBooks

98.9% positive Feedback19.7M items sold

Joined Mar 2015
Registered as a business seller
Just Voted on Newsweek - ThriftBooks ranks #1 America's Best Online Shops 2025 in Office, Electronics & Media sector, Media category!!ThriftBooks is a fully independent seller of used books, having ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
5.0
Communication
4.9

Popular categories from this shop

Seller Feedback (5,685,775)

All ratings
Positive
Neutral
Negative
  • c***m (410)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    WOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
  • a***r (375)- Feedback left by buyer.
    Past month
    Verified purchase
    i am so happy to have every book of this series! the price of the book & the shipping is very reasonable! the book was as described & was in excellent condition! it was shipped quickly & arrived quickly! the books are always packaged carefully so they arrived undamaged! the communication from the sellers is always excellent--they go out of their way for excellent customer service! i have been a repeat customer from this seller & always will be! this seller is the best bookseller on ebay!
  • l***b (331)- Feedback left by buyer.
    Past month
    Verified purchase
    5 STARS on ALL aspects... ITEM AS DESCRIBED - 5 STARS... PACKAGING & SHIPPING - 5 STARS... VALUE OF ITEM RECEIVED - 5 STARS... COMMUNICATION - 5 STARS. Would highly recommend this seller to all Ebay buyers without any reservations. Thanks again for your business with BB812, and we do appreciate your care and consideration of our offer. HAPPY EBAY LIFE !!!