Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows; John Chirillo; 2002

Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows Upplaga 2

av John Chirillo
John Chirillo is back and ready to help you outsmart the next generation of intruders!
Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.
This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)
Bonus CD!
To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.
John Chirillo is back and ready to help you outsmart the next generation of intruders!
Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.
This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)
Bonus CD!
To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.
Upplaga: 2a upplagan
Utgiven: 2002
ISBN: 9780471232834
Förlag: John Wiley & Sons
Format: Häftad
Språk: Engelska
Sidor: 704 st
John Chirillo is back and ready to help you outsmart the next generation of intruders!
Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.
This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)
Bonus CD!
To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.
John Chirillo is back and ready to help you outsmart the next generation of intruders!
Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.
This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)
Bonus CD!
To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.
Begagnad bok (0 st)
Begagnad bok (0 st)