• Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Network Security Assessme... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par momox fr
État: D'occasion: Très bon
Commentaire: En Stock.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Network Security Assessment 2e (Anglais) Broché – 23 novembre 2007


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 52,79
EUR 34,67 EUR 6,10

Il y a une édition plus récente de cet article:

Network Security Assessment 3e
Actuellement indisponible.

Offres spéciales et liens associés


Descriptions du produit

Book by McNab Chris

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.




Détails sur le produit


Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x93d99984) étoiles sur 5 6 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x9354df00) étoiles sur 5 Any collection catering to programmers or network managers needs 6 janvier 2008
Par Midwest Book Review - Publié sur Amazon.com
Format: Broché
Chris McNab's NETWORK SECURITY ASSESSMENT appears in its second updated edition to cover the protocols for testing network security - by trying to attack it internally. Tricks and tools professional security consultants use to identify and correct risks in Internet-based networks are revealed in chapters covering everything from Windows networking components and Unix RPC services on various platforms to application-level vulnerabilities. Any collection catering to programmers or network managers needs NETWORK SECURITY ASSESSMENT in its latest updated second edition.
HASH(0x93551648) étoiles sur 5 Good taster for the world of network penetration testing 22 février 2012
Par Ian Tibble (author of Security De-engineering) - Publié sur Amazon.com
Format: Format Kindle
This book gives a good cross-technology baseline from which to learn about penetration testing. I would make this mandatory reading for all Security Analysts. Previous to this book I had not seen a more business-oriented vulnerability assessment guide. There's an awful lot of writing out there about theoretical attack vectors and techniques, but very few of these are oriented to needs of businesses in the real world of the actual risks faced by businesses.
In terms of it's applicability to penetration testing as a whole...we're talking about a huge field of knowledge, but this book should at least be seen as a very good place from which to start. Some of the more exotic attacks and exploits are not covered, but then again, the more exotic sides of penetration testing rarely are deployed in anger in a commercial penetration test.
As I have commented in my own book (Security De-Engineering: Solving the Problems in Information Risk Management) Penetration testing in today's commercial world is in most cases just a compliance show (companies need to show auditors their perimeter (whatever that is these days) has been tested by an independent third party), but there are some niches where quality is sought and appreciated. This book gives those entering such areas of the industry a very good start.
HASH(0x935516a8) étoiles sur 5 Still good companion for the security prosessional 2 juillet 2008
Par JEO - Publié sur Amazon.com
Format: Broché Achat vérifié
This review is a comparison between the first and second edition. Other readers have properly described the book and you won't find anything different.

The book is still very concise (its strength) and to the point. The previous edition had some links (or many I'd say) that were not working, or simply do not exist anymore. In this sense it's a good update.

Probably the author had to decide between waiting more and revamp an important part of the book, or publish this edition with no major updates or changes.

The book is still a good companion so buy it if it's not in your library. But if you have it wait for a third edition when all major updates in major operating systems take place.
HASH(0x9354de10) étoiles sur 5 One of the best tools to get knowledge 9 novembre 2010
Par GUADALUPE - Publié sur Amazon.com
Format: Broché Achat vérifié
and fundamental tips in the network security.

Nowadays when the security is an issue not only in the computers and systems but also in the networks and internet based process and transactions, this book provided its structure is quite easy to undertand and a helps you findout the explanation of this process.
1 internautes sur 2 ont trouvé ce commentaire utile 
HASH(0x93551540) étoiles sur 5 Essential For Security Concerned IT Admins 2 avril 2008
Par Dan McKinnon - Publié sur Amazon.com
Format: Broché
'Network Security Assessment: Know Your Network' is an absolute must buy for anyone that runs/admins a network and needs to know the tricks to keeping things safer in today's connected world. Warning right off the bat that this is a very niche market of reader and it's NOT NOT NOT for the regular developer or admin. This is heavy on the technical jargon and you better know all your acronyms like there is no tomorrow from TCP to IP to LDAP to xxx!!

From IIS to VPN to Databases and regular Windows usage there are tons of case studies and examples throughout that will help you plug leaks and keep the bad guys out. Here's a chapter overview:

01. Network Security Assessment Basics
02. Network Security Assessment Platform
03. Internet Host and Network Enumeration
04. IP Network Scanning
05. Assessing Remote Information Services
06. Assessing Web Servers
07. Assessing Web Applications
08. Assessing Remote Maintenance Services
09. Assessing Database Services
10. Assessing Windows Networking Services
11. Assessing Email Services
12. Assessing IP VPN Services
13. Assessing Unix RPC Services
14. Application-Level Risks
15. Running Nessus
16. Exploitation Frameworks

***** HIGHLY RECOMMENDED
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?