News Stay informed about the latest enterprise technology news and product updates.

'Hacking for Dummies' giveaway contest

Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver.

When it comes to rooting out weaknesses in your network, you absolutely cannot be without good security testing tools. Like trying to build a deck onto your house without a hammer, attempting to assess your network security without good tools is delusional. Sure, they aren't everything -- you do have to apply your expertise and context to understand what their results mean -- but good tools are essential for IT and security professionals who take their careers seriously.

More resources
Download chapter 9 from Kevin's book, "Hacking for Dummies"

Article: Network hacking for dummies: Not just for dummies anymore

With Hacking for Dummies, you'll learn how to test your systems, plug the holes, and foil attackers. You'll find out how external hacker and rogue insider hacks happen, how to discover where your systems and network are weak, what you can do to strengthen your defenses, and how to prepare reports and recommendations to management.

The editors of SearchNetworking.com and I would like you to tell us what security tools you use on your network. Use the Sound Off button at the bottom of this page to briefly describe the tools you use and why. (See contest instructions below.)

Five lucky readers will win their very own copy of Hacking for Dummies, 2nd Edition. Winners will be chosen at random from qualified entries.

Contest instructions:

1. Scroll to the bottom of the page and click the "Post your comments" link next to "Sound Off." You will be taken to the "Post a Message" page, where you will see a text field.

Please note: You will not be required to enter any personal information for this contest, but you must be a registered TechTarget member to use our Sound Off feature. If you have not registered or signed in, you will be prompted to do so when you click the "Sound Off" link. The handle you chose when you registered will appear with your post.

2. Enter your response to the discussion suggestion above by February 23, 2007. (Contest closes at the end of business on February 23, 2007.)

3. Important! Be sure to check the contact box at the bottom of this page; otherwise we will not be able to contact you (and your entry will not be considered).

Hint: The contact box is next to the words: "If you are willing to be contacted by our editors about your post, please check the box."

4. Click on "Post my message." Your posting should appear on the site within 90 seconds.

The Sound Off feature will send the editors a private email, and we will reply to you personally (if you are a winner) to ask for your mailing address.

Sound Off feature directly below!

Dig Deeper on Network Security Monitoring and Analysis

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close