About this item
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack.
Author Chris McNab demonstrates how determined adversaries map attack surface and exploit security weaknesses at both the network and application level. The third edition is a complete overhaul—grouping and detailing the latest hacking techniques used to attack enterprise networks. By categorizing individual threats, you will be able to adopt defensive strategies against entire attack classes, providing protection now and into the future.
The testing approaches within the book are written in-line with internationally recognized standards, including NIST SP 800-115, NSA IAM, CESG CHECK, and PCI DSS.
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security analysts and consultants use to identify and assess risks in internet-based networks?the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
This book demonstrates how a determined attacker scours internet-based networks in search of vulnerable components, from the network to the application level. This third edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create proactive defensive strategies against entire attack categories, providing protection now and into the future.
This book includes:
- The latest hacking tools, techniques, and defense strategies
- Relevant background information regarding stack overflows, heap corruption, format string bugs, and more
- Testing approaches based on standards recognized by the US and UK governments
- An author who works as a technical director for a security firm that consults Merrill Lynch, American Express and other high-profile clients