Managing A Network Vulnerability Assessment

Regular price €95.99
A01=John A. Blackley
A01=Justin Peltier
A01=Thomas R. Peltier
advanced network security assessment guide
Assessment Project Manager
auerbach
Author_John A. Blackley
Author_Justin Peltier
Author_Thomas R. Peltier
Category=UR
Category=URY
cybersecurity risk assessment
DNS Server
document
DoS Attack
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
ICMP
implement
Implement Standards
information
Information Security
Information Security Life Cycle
Information Security Policies
ISO 17799 compliance
Li Ne
network threat analysis
NVA
Operating System Information
penetration testing methods
policy
project
Project Scope Document
publications
Sam Spade
scope
security
security audit procedures
Sensitive Information
Specialty Tools
standards
Strategic Business Directions
Target Network
Task List
Tcp Port
technical vulnerability identification
Vendor's Comments
Vendor’s Comments
Vulnerability Assessment
Vulnerability Assessment Model
Vulnerability Scanning Tools
War Dialers
Www Site

Product details

  • ISBN 9780849312700
  • Weight: 1200g
  • Dimensions: 178 x 254mm
  • Publication Date: 28 May 2003
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Paperback
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
Thomas R. Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA) (Author) , Justin Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA) (Author) , John A. Blackley (Peltier & Associates) (Author)