- Shopping Bag ( 0 items )
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.
In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.
|Ch 1||Unix host security||1|
|Ch 2||Windows host security||47|
|Ch 3||Network security||66|
|Ch 5||Monitoring and trending||156|
|Ch 6||Secure tunnels||176|
|Ch 7||Network intrusion detection||219|
|Ch 8||Recovery and response||268|
Posted June 17, 2012
Posted February 5, 2009
Network Security Hacks by Andrew Lockhart was a very fun and interesting read. While I do not recommend it for those that are just getting into the System Administration and Networking field, I do believe this book should not only sit on the shelves of System Administrators, but should be used frequently for reference. The book promises 100 industrial strength tips and tools, and it delivers that and more. The book is basically a learn-by-example book, which works best for me when studying this field. The examples are very well-written, and provide many example text outputs and screenshots. The book is divided into UNIX, Windows, and network security.<BR/><BR/>The first chapter covers UNIX security, which I already had a good background in, and taught me some lower-level kernel and file system security. The second chapter covers Windows security: The basics of encrypting folders, restricting users and checking for patches, and monitoring log files. In my opinion, this chapter was the weakest in the entire book. If you are looking for more in-depth Windows security, I suggest looking elsewhere. The rest of the book covers network security and its related components. This section is where the book really shines, covering everything from intrusion detection to logging and monitoring.<BR/><BR/>My favorite feature of this book is that it will present you with a potential security problem and then a possible solution, but then the book will ask: what if a hacker did this or that? Asking questions in this manner gives you the proper mindset you need to start securing your systems.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.