Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Assessing Network Security

5.0 out of 5 stars 3 customer reviews
ISBN-13: 978-8120326606
ISBN-10: 0735620334
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Buy used
$3.89
Condition: Used - Good
In Stock. Sold by Goodwill Charlotte Books
Condition: Used: Good
Comment: CD is enclosed. Great reading copy, may show some signs of wear. Ships Fast! Satisfaction Guaranteed!
Access codes and supplements are not guaranteed with used items.
13 Used from $3.88
+ $3.99 shipping
More Buying Choices
9 New from $10.95 13 Used from $3.88
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


The Amazon Book Review
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
click to open popover


Customers Viewing This Page May Be Interested In These Sponsored Links

  (What's this?)

Editorial Reviews

About the Author

NO_CONTENT_IN_FEATURE

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Paperback: 592 pages
  • Publisher: Microsoft Press (July 21, 2004)
  • Language: English
  • ISBN-10: 0735620334
  • ISBN-13: 978-8120326606
  • Product Dimensions: 7.3 x 1.6 x 9 inches
  • Shipping Weight: 2.6 pounds
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #1,123,835 in Books (See Top 100 in Books)

Customers Viewing This Page May Be Interested In These Sponsored Links

  (What's this?)

Customer Reviews

5 star
100%
4 star
0%
3 star
0%
2 star
0%
1 star
0%
See all verified purchase reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Now, I've read some pretty bad books on penetration testing and nobody seemed to get this fun subject right! Good news - this time somebody did! This great tome ("Assessing Network Security") comes to us direct from the bunkers of Redmond. Written by three Microsoft security researchers, the book provides a great overview as well as in-depth coverage of assessing security via pen testing, scanning, IT audit and other means.

The books starts from a nice overview of key principles of security (definitely not news for industry practitioners, but nice anyway), and then goes on to defines vulnerability assessment, penetration testing and security audit. A critically important section on reporting the findings is also nicely written and shows that the authors are knowledgeable about the subject. The book then goes into developing and maintaining the pentesting skills, and descends into choosing the training and resources (nice for those starting in the field). The actual pentesting process is split into non-intrusive (combining the usual "intelligence gathering" with port scans, sweeps and various host queries) and intrusive tests (such as running a vulnerability scanner, brute-forcing passwords, DoS testing and others). Some entries seem to belong in both categories (such as sniffing) but are placed into the intrusive section, for whatever reason. All the host latest content (wireless, Bluetooth and web assessments) is well represented in the book. A fairly insightful social engineering testing section (that touched on dumpster diving and other non-network assessment methods) is also present. My favorite chapter was the one on 'case studies' - examples of specific threats/tests against web, email, VPN and domain controller systems.
Read more ›
Comment 18 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I purchased this book a year and a half ago, after it was recommended to me, but didn't read it until now. Boy was I pleased to have picked it up, though.

This was my first book on the practice of Penetration Testing, so the processes, methodologies and general underlying theories it presented were extremely valuable. In my day to day course of work as a Sys Admin, I found myself reanalyzing my network with newly gained perspectives. I found it to be very effective in turning the vague unknown threat into something visible and tangible -- instead of following what best practices I was aware of to create security, this book helped greatly in defining -why- those best practices created a secure front, and which would be more valuable to implement in my organization.

I also echo the other reviews who said it was fairly dry in general, but the sidebars and real life stories were very enjoyable. All in all, I would highly recommend this to anyone, particularly if they're entering the world of security from a Microsoft background.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Just the basic concept of this book is interesting. If anyone wanted to do a denial of service attack on my web site, or was really interested in coming in -- well, why would they care. But the Microsoft site, if you could bring it down you would certainly have bragging rights in certain circles.

So if you really want to know about security, who better to read than people responsible for keeping the Microsoft site up and running.

The book has four major sections:

Planning and Performing Security assessments

Penetration Testing for Nonintrusive Attacks

Penetration Testing for Instrusive Attacks

Security Assessment Case Studies.

One thing I really appreciate in this book is the little stories from the real world. In between the description and tutorials (this is computer stuff, it's pretty dry) there are little notes of what really happened in a situation where this particular area was being tested. It gives the book the ring of truth, the sound of experience.

Highly Recommended.
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse