Picture 1 of 1
![Hack Attacks Testing: How to Conduct Your Own Security Audit [With CDROM] - Picture 1 of 1](https://i.ebayimg.com/images/g/MIIAAOSwBiRZc0vH/s-l500.jpg)
Gallery
Picture 1 of 1
![Hack Attacks Testing: How to Conduct Your Own Security Audit [With CDROM] - Picture 1 of 1](https://i.ebayimg.com/images/g/MIIAAOSwBiRZc0vH/s-l500.jpg)
Have one to sell?
Hack Attacks Testing: How to Conduct Your Own Security Audit [With CDROM]
by Chirillo, John | PB | Acceptable
US $9.14
Approximately£6.77
Condition:
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ”... Read moreAbout condition
Acceptable
A book with obvious wear. May have some damage to the book cover but the book is still completely intact. The binding may be slightly damaged around the edges but it is still completely intact. May have some underlining and highlighting of text and some writing in the margins, but there are no missing pages or anything else that would compromise the readability or legibility of the text. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free Economy Shipping.
Estimated between Fri, 25 Jul and Wed, 30 Jul to 94104
Located in: Aurora, Illinois, United States
Returns:
30 days return. Seller pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:376085569048
Item specifics
- Condition
- Acceptable
- Seller notes
- Binding
- Paperback
- Book Title
- Hack Attacks Testing
- Weight
- 1 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780471229469
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471229466
ISBN-13
9780471229469
eBay Product ID (ePID)
2355905
Product Key Features
Number of Pages
560 Pages
Language
English
Publication Name
Hack Attacks Testing : How to Conduct Your Own Security Audit
Subject
Security / General
Publication Year
2003
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.2 in
Item Weight
30.3 Oz
Item Length
9.4 in
Item Width
7.4 in
Additional Product Features
Intended Audience
Trade
LCCN
2002-152542
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Acknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR *NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.
Synopsis
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more., Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
LC Classification Number
QA76.9.A25
Item description from the seller
Seller business information
About this seller
ThriftBooks
98.9% positive Feedback•19.7M items sold
Registered as a business seller
Popular categories from this shop
Seller Feedback (5,685,775)
- c***m (410)- Feedback left by buyer.Past 6 monthsVerified purchaseWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
- a***r (375)- Feedback left by buyer.Past monthVerified purchasei am so happy to have every book of this series! the price of the book & the shipping is very reasonable! the book was as described & was in excellent condition! it was shipped quickly & arrived quickly! the books are always packaged carefully so they arrived undamaged! the communication from the sellers is always excellent--they go out of their way for excellent customer service! i have been a repeat customer from this seller & always will be! this seller is the best bookseller on ebay!
- l***b (331)- Feedback left by buyer.Past monthVerified purchase5 STARS on ALL aspects... ITEM AS DESCRIBED - 5 STARS... PACKAGING & SHIPPING - 5 STARS... VALUE OF ITEM RECEIVED - 5 STARS... COMMUNICATION - 5 STARS. Would highly recommend this seller to all Ebay buyers without any reservations. Thanks again for your business with BB812, and we do appreciate your care and consideration of our offer. HAPPY EBAY LIFE !!!