Nmap in the Enterprise

Nmap in the Enterprise
Author: Angela Orebaugh,Becky Pinkard
Publsiher: Elsevier
Total Pages: 264
Release: 2011-08-31
ISBN 10: 0080558747
ISBN 13: 9780080558745
Language: EN, FR, DE, ES & NL

Nmap in the Enterprise Book Review:

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. • Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. • Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. • Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. • Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. • Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions • Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. • “Tool around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. • Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. • Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

Nmap in the Enterprise

Nmap in the Enterprise
Author: Angela Orebaugh,Becky Pinkard
Publsiher: Unknown
Total Pages: 264
Release: 2011
ISBN 10:
ISBN 13: OCLC:1105798449
Language: EN, FR, DE, ES & NL

Nmap in the Enterprise Book Review:

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions. Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. 'Tool' around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

Learning Red Hat Enterprise Linux and Fedora

Learning Red Hat Enterprise Linux and Fedora
Author: Bill McCarty
Publsiher: "O'Reilly Media, Inc."
Total Pages: 326
Release: 2004
ISBN 10: 9780596005894
ISBN 13: 059600589X
Language: EN, FR, DE, ES & NL

Learning Red Hat Enterprise Linux and Fedora Book Review:

Explains how to install and configure Linux, how to run productivity tools, how to burn CDs and synchronize a PalmPilot, how to set up software, how to configure a network, and how to use the system administration tools.

Enterprise Security

Enterprise Security
Author: Alex Noordergraaf
Publsiher: Sun Microsystems Press
Total Pages: 433
Release: 2002
ISBN 10:
ISBN 13: UOM:39015055078151
Language: EN, FR, DE, ES & NL

Enterprise Security Book Review:

-- Provides tricks, tools, and techniques that hackers use to break into systems-- Includes complete documentation and CD-ROM of the Solaris Security Toolkit-- Part of the Sun Microsystems Press Blueprint seriesThis guide provides the reader with best practices from Sun Microsystems for architecting multi-tiered datacenter environments.This Sun Microsystems Blue Print features documented, automated, and supported security best practices for high-end servers and cluster software. Written for experienced developers and system administrators it includes tricks, tools, and techniques that hackers use to break into systems. The author details best practices and tools for sniffing out "trojaned" system files and binaries and describes Solaris security features, network settings, and minimization.

Nmap 6 Cookbook

Nmap 6 Cookbook
Author: Nicholas Marsh
Publsiher: Createspace Independent Pub
Total Pages: 226
Release: 2015-02-01
ISBN 10: 9781507781388
ISBN 13: 1507781385
Language: EN, FR, DE, ES & NL

Nmap 6 Cookbook Book Review:

The Nmap 6 Cookbook provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, and Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - The Nmap scan comparison utility* Ncat - A flexible networking utility* Nping - Ping on steroids

Nmap Network Scanning

Nmap Network Scanning
Author: Gordon Lyon
Publsiher: Nmap Project
Total Pages: 434
Release: 2008-01
ISBN 10: 9780979958717
ISBN 13: 0979958717
Language: EN, FR, DE, ES & NL

Nmap Network Scanning Book Review:

The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits all levels of security and networking professionals.

Quick Start Guide to Penetration Testing

Quick Start Guide to Penetration Testing
Author: Sagar Rahalkar
Publsiher: Apress
Total Pages: 139
Release: 2018-11-29
ISBN 10: 148424270X
ISBN 13: 9781484242704
Language: EN, FR, DE, ES & NL

Quick Start Guide to Penetration Testing Book Review:

Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. What You Will Learn Carry out basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit Who This Book Is For Readers new to penetration testing who would like to get a quick start on it.

The Secured Enterprise

The Secured Enterprise
Author: Paul E. Proctor,Christina Byrnes,F. Christian Byrnes
Publsiher: Prentice Hall Ptr
Total Pages: 304
Release: 2002
ISBN 10:
ISBN 13: UCSC:32106011422901
Language: EN, FR, DE, ES & NL

The Secured Enterprise Book Review:

This is the essential guide to information security for the business professional that explains how to protect a company's assets from a human and technology perspective. The guide also covers key products and vendors.

Kali Linux Network Scanning Cookbook

Kali Linux Network Scanning Cookbook
Author: Justin Hutchens
Publsiher: Packt Publishing Ltd
Total Pages: 452
Release: 2014-08-21
ISBN 10: 1783982152
ISBN 13: 9781783982158
Language: EN, FR, DE, ES & NL

Kali Linux Network Scanning Cookbook Book Review:

Kali Linux Network Scanning Cookbook is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience.

Nmap 6 Network Exploration and Security Auditing Cookbook

Nmap 6  Network Exploration and Security Auditing Cookbook
Author: Paulino Calderon Pale
Publsiher: Packt Publishing Ltd
Total Pages: 318
Release: 2012-10-01
ISBN 10: 1849517495
ISBN 13: 9781849517492
Language: EN, FR, DE, ES & NL

Nmap 6 Network Exploration and Security Auditing Cookbook Book Review:

Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering.

Building and Managing a Cloud Using Oracle Enterprise Manager 12c

Building and Managing a Cloud Using Oracle Enterprise Manager 12c
Author: Madhup Gulati,Adeesh Fulay,Sudip Datta
Publsiher: McGraw Hill Professional
Total Pages: 304
Release: 2013-02-13
ISBN 10: 0071763228
ISBN 13: 9780071763226
Language: EN, FR, DE, ES & NL

Building and Managing a Cloud Using Oracle Enterprise Manager 12c Book Review:

Master Cloud Computing with Oracle Enterprise Manager 12c Gain organizational agility, foster innovation, and lower TCO by adopting a service-oriented, cloud-based IT solution. Building and Managing a Cloud Using Oracle Enterprise Manager 12c thoroughly explains how to architect, configure, and manage components of a public or private cloud lifecycle. Discover how to choose the right architecture, deploy applications, govern self-service provisioning, monitor users, and implement security. This Oracle Press guide features best practices and case studies from the authors’ experiences as Oracle product managers. Plan and deploy a flexible cloud infrastructure Configure Oracle Enterprise Manager 12c Self Service Portal Bundle applications using Oracle Virtual Assembly Builder Set up, manage, and monitor IaaS, PaaS, and DBaaS Meter usage and establish chargeback policies Work with large-scale clouds and enforce compliance Manage cloud service levels Diagnose and repair bottlenecks and faults

Windows Forensics and Incident Recovery

Windows Forensics and Incident Recovery
Author: Harlan Carvey
Publsiher: Addison-Wesley Professional
Total Pages: 460
Release: 2004
ISBN 10:
ISBN 13: UOM:39015060773325
Language: EN, FR, DE, ES & NL

Windows Forensics and Incident Recovery Book Review:

The first book completely devoted to this important part of security in a Windows environment.

Nessus Network Auditing

Nessus Network Auditing
Author: Russ Rogers
Publsiher: Elsevier
Total Pages: 448
Release: 2011-10-13
ISBN 10: 0080558658
ISBN 13: 9780080558653
Language: EN, FR, DE, ES & NL

Nessus Network Auditing Book Review:

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. The first edition is still the only book available on the product. Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Practical Network Scanning

Practical Network Scanning
Author: Ajay Singh Chauhan
Publsiher: Packt Publishing Ltd
Total Pages: 326
Release: 2018-05-24
ISBN 10: 1788832493
ISBN 13: 9781788832496
Language: EN, FR, DE, ES & NL

Practical Network Scanning Book Review:

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book Description Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is for If you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Learn Kali Linux 2019

Learn Kali Linux 2019
Author: Glen D. Singh
Publsiher: Packt Publishing Ltd
Total Pages: 550
Release: 2019-11-14
ISBN 10: 1789612624
ISBN 13: 9781789612622
Language: EN, FR, DE, ES & NL

Learn Kali Linux 2019 Book Review:

Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects. Through real-world examples, you’ll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you’ll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you’ll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You’ll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment. By the end of this book, you’ll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learn Explore the fundamentals of ethical hacking Learn how to install and configure Kali Linux Get up to speed with performing wireless network pentesting Gain insights into passive and active information gathering Understand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attack Who this book is for If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you’re simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.

SUSE LINUX Enterprise Server 9 Administrator s Handbook

SUSE LINUX Enterprise Server 9 Administrator s Handbook
Author: Peter Kuo,Jacques Beland
Publsiher: Pearson Education
Total Pages: 552
Release: 2005-06-29
ISBN 10: 067233268X
ISBN 13: 9780672332685
Language: EN, FR, DE, ES & NL

SUSE LINUX Enterprise Server 9 Administrator s Handbook Book Review:

As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through installing and securing a SLES 9 system, and it will focus on the specific security features that make SLES 9 an important platform for all system administrators. Some of what you will cover is: SuSE server installation User access and security Installing and configuring networking services Securing your SuSE server Leverage Linux and open source with SLES 9 and SUSE Linux Enterprise Server Administrator's Handbook to build a secure computing network for your company.

Mastering the Nmap Scripting Engine

Mastering the Nmap Scripting Engine
Author: Paulino Calderón Pale
Publsiher: Packt Publishing Ltd
Total Pages: 244
Release: 2015-02-18
ISBN 10: 178216832X
ISBN 13: 9781782168324
Language: EN, FR, DE, ES & NL

Mastering the Nmap Scripting Engine Book Review:

If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap.

Implementing DirectAccess with Windows Server 2016

Implementing DirectAccess with Windows Server 2016
Author: Richard M. Hicks
Publsiher: Apress
Total Pages: 279
Release: 2016-09-10
ISBN 10: 1484220595
ISBN 13: 9781484220597
Language: EN, FR, DE, ES & NL

Implementing DirectAccess with Windows Server 2016 Book Review:

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner. DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets. Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book: Explains how the technology works and the specific IT pain points that it addresses Includes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016 Addresses real-world deployment scenarios for small and large organizations Contains valuable tips, tricks, and implementation best practices for security and performance“/li> What you’ll learn A high-level understanding of the various remote access technologies included in Windows Server 2016. Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highly available manner. Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices. Who This Book Is For IT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title.

The Art of Network Penetration Testing

The Art of Network Penetration Testing
Author: Royce Davis
Publsiher: Manning Publications
Total Pages: 304
Release: 2020-12-29
ISBN 10: 1617296821
ISBN 13: 9781617296826
Language: EN, FR, DE, ES & NL

The Art of Network Penetration Testing Book Review:

The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. Summary Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The Art of Network Penetration Testing teaches you how to take over an enterprise network from the inside. It lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Penetration testers uncover security gaps by attacking networks exactly like malicious intruders do. To become a world-class pentester, you need to master offensive security concepts, leverage a proven methodology, and practice, practice, practice. Th is book delivers insights from security expert Royce Davis, along with a virtual testing environment you can use to hone your skills. About the book The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords, exploit unpatched services, and elevate network level privileges, you’ll learn where the weaknesses are—and how to take advantage of them. What's inside Set up a virtual pentest lab Exploit Windows and Linux network vulnerabilities Establish persistent re-entry to compromised targets Detail your findings in an engagement report About the reader For tech professionals. No security experience required. About the author Royce Davis has orchestrated hundreds of penetration tests, helping to secure many of the largest companies in the world. Table of Contents 1 Network Penetration Testing PHASE 1 - INFORMATION GATHERING 2 Discovering network hosts 3 Discovering network services 4 Discovering network vulnerabilities PHASE 2 - FOCUSED PENETRATION 5 Attacking vulnerable web services 6 Attacking vulnerable database services 7 Attacking unpatched services PHASE 3 - POST-EXPLOITATION AND PRIVILEGE ESCALATION 8 Windows post-exploitation 9 Linux or UNIX post-exploitation 10 Controlling the entire network PHASE 4 - DOCUMENTATION 11 Post-engagement cleanup 12 Writing a solid pentest deliverable

Enterprise Network Testing

Enterprise Network Testing
Author: Andy Sholomon,Tom Kunath
Publsiher: Pearson Education
Total Pages: 504
Release: 2011-04-14
ISBN 10: 9781587140969
ISBN 13: 1587140969
Language: EN, FR, DE, ES & NL

Enterprise Network Testing Book Review:

Enterprise Network Testing Testing Throughout the Network Lifecycle to Maximize Availability and Performance Andy Sholomon, CCIE® No. 15179 Tom Kunath, CCIE No. 1679 The complete guide to using testing to reduce risk and downtime in advanced enterprise networks Testing has become crucial to meeting enterprise expectations of near-zero network downtime. Enterprise Network Testing is the first comprehensive guide to all facets of enterprise network testing. Cisco enterprise consultants Andy Sholomon and Tom Kunath offer a complete blueprint and best-practice methodologies for testing any new network system, product, solution, or advanced technology. Sholomon and Kunath begin by explaining why it is important to test and how network professionals can leverage structured system testing to meet specific business goals. Then, drawing on their extensive experience with enterprise clients, they present several detailed case studies. Through real-world examples, you learn how to test architectural “proofs of concept,” specific network features, network readiness for use, migration processes, security, and more. Enterprise Network Testing contains easy-to-adapt reference test plans for branches, WANs/MANs, data centers, and campuses. The authors also offer specific guidance on testing many key network technologies, including MPLS/VPN, QoS, VoIP, video, IPsec VPNs, advanced routing (OSPF, EIGRP, BGP), and Data Center Fabrics. § Understand why, when, and how you should test your network § Use testing to discover critical network design flaws § Incorporate structured systems testing into enterprise architecture strategy § Utilize testing to improve decision-making throughout the network lifecycle § Develop an effective testing organization and lab facility § Choose and use test services providers § Scope, plan, and manage network test assignments § nLeverage the best commercial, free, and IOS test tools § Successfully execute test plans, including crucial low-level details § Minimize the equipment required to test large-scale networks § Identify gaps in network readiness § Validate and refine device configurations § Certify new hardware, operating systems, and software features § Test data center performance and scalability § Leverage test labs for hands-on technology training This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.