Hack Attacks Testing: How to Conduct Your Own Security Audit
John Chirillo
Chirillo, a networking engineer, gives step-by-step directions for performing network security audits in this book/CD-ROM package for security engineers and network administrators. He offers instructions on setting up Tiger Box operating systems, installations, and configurations for popular auditing software suites, discussing common and custom uses as well as the scanning methods and reporting routines of each. The CD-ROM contains virtual simulations of scanners.