
Hack Attacks Denied
A Complete Guide to Network Lockdown for UNIX, Windows, and Linux
Résumé
Since the publication of the First Edition, new security
breaches to networks have inevitably occurred. In order to
keep hack-prevention information as current as possible for
security engineers and designers, John Chirillo is back
with a new edition on how to fortify your networks and home
computers. He's updated his bestselling book and is ready
to arm you with the necessary security steps from the
system to the daemon, concluding with that crucial
ingredient -- an effective security policy. Packed with
nearly 400 pages of fresh material, including new
fortification techniques, advisory solutions, and firewall
labs, Hack Attacks Denied, Second Edition offers vital
insight that will teach you how to be aware of potential
security dangers.
This all-in-one reference covers Windows, UNIX, and Linux,
and teaches you how to keep the hacks out of your network
by using the same Tiger Box tools that hackers use to
detect and penetrate network vulnerabilities.
- Introduction
- Phase 1 Securing Ports and Services
- Ch. 1 Common Ports and Services
- Ch. 2 Concealed Ports and Services
- Ch. 3 Discovery Countermeasures
- Phase 2 Intrusion Defense Mechanisms
- Ch. 4 Safeguarding Against Penetration Attacks
- Phase 3 Tiger Team Secrets
- Ch. 5 Locking Down Perimeter Hardware and Service Daemons
- Ch. 6 The Top 75 Hack Attacks
- Phase 4 Putting It All Together
- Ch. 7 Security Policies
- App. A SafetyWare
- App. B Security Plan Template
- App. C: What's on the CD
- Glossary
- References
- Index
L'auteur - John Chirillo
JOHN CHIRILLO is Senior Inter-networking Engineer at
ValCom, a technology management company in the Midwest.
John holds numerous certifications including CCNA, CCDA,
CCNP, CISSP, Intel Certified Solutions Consultant, Compaq
ASE Enterprise Storage, and Master UNIX certifications,
among others. John has more than ten years of experience on
various computer systems and more than five years of
training experience. John is the author of five Wiley
books, including the Hack Attacks Series.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | John Chirillo |
Parution | 28/11/2002 |
Nb. de pages | 690 |
Format | 19 x 23 |
Couverture | Broché |
Poids | 1250g |
Intérieur | Noir et Blanc |
EAN13 | 9780471232834 |
ISBN13 | 978-0-471-23283-4 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet