Inside Internet Security: What Hackers Don't Want You To Know / Edition 1
  • Alternative view 1 of Inside Internet Security: What Hackers Don't Want You To Know / Edition 1
  • Alternative view 2 of Inside Internet Security: What Hackers Don't Want You To Know / Edition 1

Inside Internet Security: What Hackers Don't Want You To Know / Edition 1

by Jeff Crume
     
 

ISBN-10: 0201675161

ISBN-13: 9780201675160

Pub. Date: 08/29/2000

Publisher: Addison-Wesley

This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business.

With the explosion

Overview

This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business.

With the explosion growth of e-commerce and the opening up of corporate networks to external customers, security is now the number one issue for networking professionals. Concerns about hackers and the possible damage they can do to a business, and the potential vulnerabilities of a system can be overwhelming and can create an unhealthy business environment.

However, a great deal of this is based on lack of information as to exactly how hackers approach their task, and of the exact vulnerabilities that they prey on. In this book, Jeff Crume dispels this fear by putting these threats into perspective and allowing realistic defense mechanisms to be created, to the extent that security becomes a business enabler, rather than inhibitor.

Inside Internet Security describes the underlying principles that crop up again and again in hacker attacks, and then progresses focus on lessons that can be learned, and on how to protect against recurrence.

Features:
Practical hands-on advice on securing networked systems
Security checklists for common scenarios
Pointers to other detailed information sources
In-depth theoretical background information
Real-world Examples of actual attacks
A glimpse into the future of IT security

0201675161B04062001

Product Details

ISBN-13:
9780201675160
Publisher:
Addison-Wesley
Publication date:
08/29/2000
Edition description:
New Edition
Pages:
288
Product dimensions:
7.20(w) x 9.00(h) x 0.70(d)

Table of Contents

Table of Contents
I. SIZING UP THE SITUATION: SECURITY CONCEPTS.
1. Bringing down the Net
2. Is it safe?
3. What is a hacker?
4. Analyzing the risks (and counting the costs)
5. The role of policy
6. Putting all the pieces together
II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you
8. Hackers don't want you to know that ... firewalls are just the beginning
9. Hackers don't want you to know that...not all the bad guys are 'out there'
10. Hackers don't want you to know that ... humans are the weakest link
11. Hackers don't want you to know that ... passwords aren't secure
12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable
14. Hackers don't want you to know that ... defaults are dangerous
15. Hackers don't want you to know that ... it takes a thief to catch a thief
16. Hackers don't want you to know that ... attacks are getting easier
17. Hackers don't want you to know that ... virus protection is inadequate
18. Hackers don't want you to know that ... active content is more active than you think
19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto
20. Hackers don't want you to know that ... the back door is open
21. Hackers don't want you to know that ... there's no such thing as a harmless attack
22. Hackers don't want you to know that ... information is your best defence
23. Hackers don't want you to know that ... the future of hacking is bright
Appendix A: Crypto tutorialAppendix B: VPN tutorial
Glossary
Bibliography
Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >