Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the ''bad guys,'' but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the ''one-stop shop'' for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. Ø

Author(s): Erik Pace Birkholz, Stuart McClure
Edition: 1
Publisher: Syngress
Year: 2003

Language: English
Commentary: +OCR
Pages: 1042

Cover......Page 1
Contents......Page 14
1 - Assessing Internal Network Security......Page 26
2 - Inventory and Exposure of Corporate Assets......Page 46
3 - Hunting for High Severity Vulnerabilities (HSV)......Page 74
4 - Attacking and Defending Windows XP Professional......Page 110
5 - Attacking and Defending Windows 2000......Page 196
6 - Securing Active Directory......Page 268
7 - Securing Exchange and Outlook Web Access......Page 328
8 - Attacking and Defending DNS......Page 418
9 - Attacking and Defending Microsoft Terminal Services......Page 478
10 - Securing IIS......Page 536
11 - Hacking Custom Web Applications......Page 596
12 - Attacking and Defending Microsoft SQL Server......Page 644
13 - Attacking and Defending Oracle......Page 706
14 - Attacking and Defending Unix......Page 754
15 - Wireless LANs: Discovery and Defense......Page 808
16 - Network Architecture......Page 850
17 - Architecting the Human Factor......Page 910
18 - Creating Effective Corporate Security Policies......Page 962
Index......Page 1028