Inside network security assessment guarding your IT infrastructure

As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ti...

Full description

Bibliographic Details
Main Author: Gregg, Michael
Other Authors: Kim, David
Format: eBook
Language:English
Published: Indianapolis, Ind. Sams 2005
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02179nmm a2200349 u 4500
001 EB001926430
003 EBX01000000000000001089332
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0672328097 
050 4 |a TK5105.59 
100 1 |a Gregg, Michael 
245 0 0 |a Inside network security assessment  |b guarding your IT infrastructure  |c Michael Gregg, David Kim 
260 |a Indianapolis, Ind.  |b Sams  |c 2005 
300 |a 312 pages 
653 |a Sécurité informatique / Évaluation / Méthodologie 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Computer networks / Security measures / blmlsh 
653 |a Computer security / Evaluation / Methodology 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer security / Evaluation / Methodology / blmlsh 
700 1 |a Kim, David 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 0672328097 
776 |z 9780672328091 
856 4 0 |u https://learning.oreilly.com/library/view/~/0672328097/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment