Greetings, readers! Now that Amazon has disabled its popular ebook lending feature, we're more committed than ever to helping you find the best ways to borrow FREE or save big on the Kindle books that you want to read. Kindle Unlimited and Amazon Prime Reading offer members free reading access to over 1 million titles, including Kindle books, magazines, and audiobooks. Beginning soon, each day in this space we will feature "Today's FREEbies and Top Deals for Our Favorite Readers" to share top 5-star titles that are available for KU and Prime members to read FREE, plus a link to a 30-day FREE trial for Kindle Unlimited!

Lendle

Lendle is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. As an Amazon Associates participant, we earn small amounts from qualifying purchases on the Amazon sites.

Don’t wait for an attacker to find and exploit your security vulnerabilities—take the lead by assessing the state of your network’s security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features time-saving tools and scripts that you can use to reveal and help correct security vulnerabilities in your own network.


Sharpen and advance your security assessment skills, including how to:


  • Detect vulnerabilities and perform penetration tests

  • Conduct and properly report an IT security audit

  • Find hidden hosts by using DNS, WINS, and NetBIOS

  • Sweep your network to analyze network topology, existing hosts, and multi-homed systems

  • Determine the status of ICP and UDP ports by using port scanning

Recognize and help counter common network threats, including:


  • War dialing, war driving, and Bluetooth attacks

  • Packet and network sniffing

  • IP, e-mail, and DNS spoofing

  • Password cracking

  • Communication interceptions and modifications

  • IDS and IPS attacker detection avoidance

  • Spam and other e-mail abuses

CD features:


  • Tools for testing e-mail, databases, and Web servers

  • Scripts for finding common information leaks and other potential security issues

  • Complete eBook in PDF format

A Note Regarding the CD or DVD


The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Genres for this book