Inside Internet Security : What Hackers Don't Want You to Know by Jeff Crume (2000, Trade Paperback)

AlibrisBooks (463091)
98,6% de votos positivos
Precio:
USD68,21
Aproximadamente58,28 EUR
+ USD19,74 de envío
Entrega prevista: vie. 5 sep. - mar. 16 sep.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Estado:
Nuevo
New Trade paperback

Acerca de este artículo

Product Identifiers

PublisherAddison Wesley Professional
ISBN-100201675161
ISBN-139780201675160
eBay Product ID (ePID)1751964

Product Key Features

Number of Pages288 Pages
LanguageEnglish
Publication NameInside Internet Security : What Hackers Don't Want You to Know
Publication Year2000
SubjectSecurity / Online Safety & Privacy, Computer Science, Networking / Vendor Specific
TypeTextbook
Subject AreaComputers
AuthorJeff Crume
FormatTrade Paperback

Dimensions

Item Height0.7 in
Item Weight14.4 Oz
Item Length9 in
Item Width7.2 in

Additional Product Features

Intended AudienceScholarly & Professional
Reviews"This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on." Computing, August 2001 This one is a must if security is on your agenda. nternet works, September 2001,  "This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on."  Computing, August 2001  This one is a must if security is on your agenda. nternet works, September 2001
Dewey Edition21
IllustratedYes
Dewey Decimal005.8
Table Of ContentTable of Contents I. SIZING UP THE SITUATION: SECURITY CONCEPTS. 1. Bringing down the Net 2. Is it safe? 3. What is a hacker? 4. Analyzing the risks (and counting the costs) 5. The role of policy 6. Putting all the pieces together II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you 8. Hackers don't want you to know that ... firewalls are just the beginning 9. Hackers don't want you to know that...not all the bad guys are 'out there' 10. Hackers don't want you to know that ... humans are the weakest link 11. Hackers don't want you to know that ... passwords aren't secure 12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable 14. Hackers don't want you to know that ... defaults are dangerous 15. Hackers don't want you to know that ... it takes a thief to catch a thief 16. Hackers don't want you to know that ... attacks are getting easier 17. Hackers don't want you to know that ... virus protection is inadequate 18. Hackers don't want you to know that ... active content is more active than you think 19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto 20. Hackers don't want you to know that ... the back door is open 21. Hackers don't want you to know that ... there's no such thing as a harmless attack 22. Hackers don't want you to know that ... information is your best defence 23. Hackers don't want you to know that ... the future of hacking is bright Appendix A: Crypto tutorialAppendix B: VPN tutorial Glossary Bibliography Index
SynopsisThis book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence. It is a practical reference book for anyone designing or administering a corporate or eBusiness network which runs across a number of platforms via the Internet. It aims to arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of eBusiness. *practical hands-on advice on securing network systems *security checklists for each scenario *detailed pointers to other detailed information sources *in-depth theoretical background information *Multi-platform coverage *Unique external source of info on IBM systems *Wide use of diagrams and illustrations, This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence, This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize the tremendous potential of e-business. With the explosion growth of e-commerce and the opening up of corporate networks to external customers, security is now the number one issue for networking professionals. Concerns about hackers and the possible damage they can do to a business, and the potential vulnerabilities of a system can be overwhelming and can create an unhealthy business environment. However, a great deal of this is based on lack of information as to exactly how hackers approach their task, and of the exact vulnerabilities that they prey on. In this book, Jeff Crume dispels this fear by putting these threats into perspective and allowing realistic defense mechanisms to be created, to the extent that security becomes a business enabler, rather than inhibitor. Inside Internet Security describes the underlying principles that crop up again and again in hacker attacks, and then progresses to focus on lessons that can be learned, and how to protect against recurrence. Features: Practical hands-on advice on securing networked systems Security checklists for common scenarios Pointers to other detailed information sources In-depth theoretical background information Real-world Examples of actual attacks A glimpse into the future of IT security
LC Classification NumberQA75

Todos los anuncios de este producto

¡Cómpralo ya!
Cualquier estado
Nuevo
Usado
Todavía no hay valoraciones ni opiniones.
Sé el primero en escribir una opinión.