Appendix B. References

This appendix lists some additional sources of information that are referenced in the book, as well as some sources that were not referenced but might be helpful.

Chapter 1: Introduction to Performing Security Assessments

  • The Common Vulnerabilities and Exposures (CVE) index and security bulletins from software vendors: http://cve.mitre.org

Chapter 2: Key Principles of Security

Chapter 3: Using Vulnerability Scanning to Assess Network Security

Chapter 4: Conducting a Penetration Test

  • The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll (Pocket Books, 2000)

Chapter 5: Performing IT Security Audits

Chapter 6: Reporting Your Findings

  • Chicago Manual of Style, 15th Edition (University of Chicago Press, 2003)

Chapter 7: Building and Maintaining Your Security Assessment Skills

Chapter 8: Information Reconnaisance

Chapter 9: Host Discovery Using DNS and NetBIOS

Chapter 10: Network and Host Discovery

Chapter 11: Port Scanning

Chapter 12: Obtaining Information from a Host

Chapter 13: War Dialing, War Driving, and Bluetooth Attacks

Chapter 14: Automated Vulnerability Detection

Chapter 15: Password Attacks

Chapter 16: Denial of Service Attacks

Chapter 17: Application Attacks

Chapter 18: Database Attacks

Chapter 19: Network Sniffing

Chapter 20: Spoofing

Chapter 21: Session Hijacking

Chapter 22: How Attackers Avoid Detection

Chapter 23: Attackers Using Non-Network Methods to Gain Access

Chapter 24: Web Threats

Chapter 25: E-Mail Threats

Chapter 26: Domain Controller Threats

Chapter 27: Extranet and VPN Threats

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.104.120