Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
36
result(s) for
"Pfeil, Ken"
Sort by:
Network Security Assessment: From Vulnerability to Patch
2006,2007
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.* Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system* Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine* Covers in the detail the vulnerability management lifecycle from discovery through patch.
Network Security Assessment
2006
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.
Hack proofing your network
by
Ahmad, David R. Mirza
in
Computer networks
,
Computer networks -- Security measures
,
Security measures
2002
A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:· The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure SystemsThe central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagshipCovers more methods of attack and hacker secretsInterest in topic continues to grow - network architects, engineers and administrators continue to scramble for security booksWritten by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials· A great addition to the bestselling \"Hack Proofing...\" series· Windows 2000 sales have surpassed those of Windows NT· Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp· Unrivalled web support at www.solutions@syngress.com
Vulnerability Management
by
Gold, Andrew
,
Manzuik, Steve
,
Pfeil, Ken
in
COMPUTER COMMUNICATIONS & NETWORKING
,
Data encryption
2006
Book Chapter
Windows of Vulnerability
by
Gold, Andrew
,
Manzuik, Steve
,
Pfeil, Ken
in
COMPUTER COMMUNICATIONS & NETWORKING
,
Data encryption
2006
Book Chapter
Going Further
by
Gold, Andrew
,
Manzuik, Steve
,
Pfeil, Ken
in
COMPUTER COMMUNICATIONS & NETWORKING
,
Data encryption
2006
Book Chapter
Vulnerability Management Tools
by
Gold, Andrew
,
Manzuik, Steve
,
Pfeil, Ken
in
COMPUTER COMMUNICATIONS & NETWORKING
,
Data encryption
2006
Book Chapter
Vulnerability Assessment 101
by
Gold, Andrew
,
Manzuik, Steve
,
Pfeil, Ken
in
COMPUTER COMMUNICATIONS & NETWORKING
,
Data encryption
2006
Book Chapter