9. Scanning the Horizon

Chapter Spotlight

• Port scanning, vulnerability enumeration, topology mapping

• Subnets and architectural protections; security perimeter

• Firewalls: their purpose, design, and configurations

• Network address translation

“Keep your hands in your pockets and don’t touch ...

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.