Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure
bBuild a network security threat model with this comprehensive learning guide/b h4Key Features/h4 ulliDevelop a network security threat model for your organization /li liGain hands-on experience in working with network scanning and analyzing tools /li liLearn to secure your network infrastructure /l...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing Limited
2018
|
Ausgabe: | 1 |
Schlagworte: | |
Zusammenfassung: | bBuild a network security threat model with this comprehensive learning guide/b h4Key Features/h4 ulliDevelop a network security threat model for your organization /li liGain hands-on experience in working with network scanning and analyzing tools /li liLearn to secure your network infrastructure /li /ul h4Book Description/h4 The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. h4What you will learn/h4 ulliDevelop a cost-effective end-to-end vulnerability management program /li liImplement a vulnerability management program from a governance perspective /li liLearn about various standards and frameworks for vulnerability assessments and penetration testing /li liUnderstand penetration testing with practical learning on various supporting tools and techniques /li liGain insight into vulnerability scoring and reporting /li liExplore the importance of patching and security hardening /li liDevelop metrics to measure the success of the vulnerability management program /li /ul h4Who this book is for/h4 Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program |
Beschreibung: | 1 Online-Ressource (254 Seiten) |
ISBN: | 9781788624725 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047069887 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781788624725 |9 978-1-78862-472-5 | ||
035 | |a (ZDB-5-WPSE)9781788624725254 | ||
035 | |a (OCoLC)1227480776 | ||
035 | |a (DE-599)BVBBV047069887 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
100 | 1 | |a Rahalkar, Sagar |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network Vulnerability Assessment |b Identify security loopholes in your network's infrastructure |c Rahalkar, Sagar |
250 | |a 1 | ||
264 | 1 | |a Birmingham |b Packt Publishing Limited |c 2018 | |
300 | |a 1 Online-Ressource (254 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a bBuild a network security threat model with this comprehensive learning guide/b h4Key Features/h4 ulliDevelop a network security threat model for your organization /li liGain hands-on experience in working with network scanning and analyzing tools /li liLearn to secure your network infrastructure /li /ul h4Book Description/h4 The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. | ||
520 | |a In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. | ||
520 | |a h4What you will learn/h4 ulliDevelop a cost-effective end-to-end vulnerability management program /li liImplement a vulnerability management program from a governance perspective /li liLearn about various standards and frameworks for vulnerability assessments and penetration testing /li liUnderstand penetration testing with practical learning on various supporting tools and techniques /li liGain insight into vulnerability scoring and reporting /li liExplore the importance of patching and security hardening /li liDevelop metrics to measure the success of the vulnerability management program /li /ul h4Who this book is for/h4 Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program | ||
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a COMPUTERS / Security / Online Safety & | |
650 | 4 | |a Privacy | |
912 | |a ZDB-5-WPSE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032476913 |
Datensatz im Suchindex
_version_ | 1804182072181391360 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Rahalkar, Sagar |
author_facet | Rahalkar, Sagar |
author_role | aut |
author_sort | Rahalkar, Sagar |
author_variant | s r sr |
building | Verbundindex |
bvnumber | BV047069887 |
collection | ZDB-5-WPSE |
ctrlnum | (ZDB-5-WPSE)9781788624725254 (OCoLC)1227480776 (DE-599)BVBBV047069887 |
edition | 1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03355nmm a2200349zc 4500</leader><controlfield tag="001">BV047069887</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788624725</subfield><subfield code="9">978-1-78862-472-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781788624725254</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047069887</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Vulnerability Assessment</subfield><subfield code="b">Identify security loopholes in your network's infrastructure</subfield><subfield code="c">Rahalkar, Sagar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing Limited</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (254 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">bBuild a network security threat model with this comprehensive learning guide/b h4Key Features/h4 ulliDevelop a network security threat model for your organization /li liGain hands-on experience in working with network scanning and analyzing tools /li liLearn to secure your network infrastructure /li /ul h4Book Description/h4 The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">h4What you will learn/h4 ulliDevelop a cost-effective end-to-end vulnerability management program /li liImplement a vulnerability management program from a governance perspective /li liLearn about various standards and frameworks for vulnerability assessments and penetration testing /li liUnderstand penetration testing with practical learning on various supporting tools and techniques /li liGain insight into vulnerability scoring and reporting /li liExplore the importance of patching and security hardening /li liDevelop metrics to measure the success of the vulnerability management program /li /ul h4Who this book is for/h4 Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Online Safety &amp</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032476913</subfield></datafield></record></collection> |
id | DE-604.BV047069887 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:33Z |
indexdate | 2024-07-10T09:01:44Z |
institution | BVB |
isbn | 9781788624725 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032476913 |
oclc_num | 1227480776 |
open_access_boolean | |
physical | 1 Online-Ressource (254 Seiten) |
psigel | ZDB-5-WPSE |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing Limited |
record_format | marc |
spelling | Rahalkar, Sagar Verfasser aut Network Vulnerability Assessment Identify security loopholes in your network's infrastructure Rahalkar, Sagar 1 Birmingham Packt Publishing Limited 2018 1 Online-Ressource (254 Seiten) txt rdacontent c rdamedia cr rdacarrier bBuild a network security threat model with this comprehensive learning guide/b h4Key Features/h4 ulliDevelop a network security threat model for your organization /li liGain hands-on experience in working with network scanning and analyzing tools /li liLearn to secure your network infrastructure /li /ul h4Book Description/h4 The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. h4What you will learn/h4 ulliDevelop a cost-effective end-to-end vulnerability management program /li liImplement a vulnerability management program from a governance perspective /li liLearn about various standards and frameworks for vulnerability assessments and penetration testing /li liUnderstand penetration testing with practical learning on various supporting tools and techniques /li liGain insight into vulnerability scoring and reporting /li liExplore the importance of patching and security hardening /li liDevelop metrics to measure the success of the vulnerability management program /li /ul h4Who this book is for/h4 Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program COMPUTERS / Security / General COMPUTERS / Security / Online Safety & Privacy |
spellingShingle | Rahalkar, Sagar Network Vulnerability Assessment Identify security loopholes in your network's infrastructure COMPUTERS / Security / General COMPUTERS / Security / Online Safety & Privacy |
title | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure |
title_auth | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure |
title_exact_search | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure |
title_exact_search_txtP | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure |
title_full | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure Rahalkar, Sagar |
title_fullStr | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure Rahalkar, Sagar |
title_full_unstemmed | Network Vulnerability Assessment Identify security loopholes in your network's infrastructure Rahalkar, Sagar |
title_short | Network Vulnerability Assessment |
title_sort | network vulnerability assessment identify security loopholes in your network s infrastructure |
title_sub | Identify security loopholes in your network's infrastructure |
topic | COMPUTERS / Security / General COMPUTERS / Security / Online Safety & Privacy |
topic_facet | COMPUTERS / Security / General COMPUTERS / Security / Online Safety & Privacy |
work_keys_str_mv | AT rahalkarsagar networkvulnerabilityassessmentidentifysecurityloopholesinyournetworksinfrastructure |