Free Book Online
Book Network Security Assessment: Know Your Network


Network Security Assessment: Know Your Network

3.3 (2986)

Log in to rate this item

    Available in PDF - DJVU Format | Network Security Assessment: Know Your Network.pdf | Language: ENGLISH
    Chris McNab(Author)

    Book details

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack.

Author Chris McNab demonstrates how determined adversaries map attack surface and exploit security weaknesses at both the network and application level. The third edition is a complete overhaul—grouping and detailing the latest hacking techniques used to attack enterprise networks. By categorizing individual threats, you will be able to adopt defensive strategies against entire attack classes, providing protection now and into the future.

The testing approaches within the book are written in-line with internationally recognized standards, including NIST SP 800-115, NSA IAM, CESG CHECK, and PCI DSS.

3.2 (4668)
  • Pdf

*An electronic version of a printed book that can be read on a computer or handheld device designed specifically for this purpose.

Formats for this Ebook

Required Software Any PDF Reader, Apple Preview
Supported Devices Windows PC/PocketPC, Mac OS, Linux OS, Apple iPhone/iPod Touch.
# of Devices Unlimited
Flowing Text / Pages Pages
Printable? Yes

Book details

  • PDF | 456 pages
  • Chris McNab(Author)
  • O'Reilly Media; 3 edition (25 Feb. 2016)
  • English
  • 3
  • Computing & Internet

Read online or download a free book: Network Security Assessment: Know Your Network


Review Text

  • By Phil on 17 February 2017

    Much better than the previous version. Better structure, updated content and very useful references to tools and examples. As I am preparing for CTL I use this book along with the previous version and I can tell this is a much better more up to date and even more pleasant read. CVEs and vulnerabilities are now more up to date and it feels as if it has a nicer flow than its predecessor.On the Microsoft Services chapter it could include a bit more information but I find it a great reference book that will point me to the right direction if I want to further investigate any topic. It also provides entry-level people with a clear methodology regarding network enumeration and assessment.I would highly recommend it to security professionals of any level.

  • By T R on 20 May 2017

    As good as the 2nd edition, a must have for anyone in network, sysadmin, IT or any defender in general.

  • By C. Rundle on 8 August 2017

    Great book. Full of useful and up-to-date enumeration techniques for a wide variety of common services, protocols, software and frameworks. This definitely belongs in the library of anyone working in IT security.

  • By Oliver on 26 July 2017

    Awesome book! Even better than the 2nd Edition.

  • By Guest on 24 May 2017


  • By Mr James M Burns on 1 February 2017

    I bought this from after Christmas, when it was not easily available over here. I already own the second edition, which is a go-to work bible for me, so I was keen to pick the newer edition up to see what had changed.It's clear to see why the book is so highly rated by infosec professionals, and the third edition is less of an update and very much a significant amendment. For anybody who already owns a previous edition and is wondering over the value of buying the updated version - it is very much worth it. All the vulnerabilities have been updated to (almost) current day (CVE references upto and including 2016 vulns). The author has also removed a lot of the antiquated protocols that none of us ever find on a test anymore (bye-bye r-services and xwindows vulns), whilst bringing the rest of the book bang up to date.It's not an easy read, it never has been, but the workflow is solid and will teach completely solid enumeration techniques. It belongs on the shelf of any professional security bod, and is particularly relevant to anybody pentesting who is looking to approach a CTL-level examination as prepared as they can be.

  • Name:
    The message text*: