When it comes to rooting out weaknesses in your network, you absolutely cannot be without good security testing tools. Like trying to build a deck onto your house without a hammer, attempting to assess your network security without good tools is delusional. Sure, they aren't everything -- you do have to apply your expertise and context to understand what their results mean -- but good tools are essential for IT and security professionals who take their careers seriously.
With Hacking for Dummies, you'll learn how to test your systems, plug the holes, and foil attackers. You'll find out how external hacker and rogue insider hacks happen, how to discover where your systems and network are weak, what you can do to strengthen your defenses, and how to prepare reports and recommendations to management.
The editors of SearchNetworking.com and I would like you to tell us what security tools you use on your network. Use the Sound Off button at the bottom of this page to briefly describe the tools you use and why. (See contest instructions below.)
Five lucky readers will win their very own copy of Hacking for Dummies, 2nd Edition. Winners will be chosen at random from qualified entries.
Please note: You will not be required to enter any personal information for this contest, but you must be a registered TechTarget member to use our Sound Off feature. If you have not registered or signed in, you will be prompted to do so when you click the "Sound Off" link. The handle you chose when you registered will appear with your post.