Practical Internet Security / Edition 1

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (15) from $1.99   
  • New (9) from $27.99   
  • Used (6) from $1.99   


As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Read More Show Less

Product Details

  • ISBN-13: 9780387405339
  • Publisher: Springer US
  • Publication date: 10/18/2006
  • Edition description: 2007
  • Edition number: 1
  • Pages: 536
  • Product dimensions: 7.34 (w) x 9.44 (h) x 1.21 (d)

Table of Contents

Introduction to Internet Security.- Establishing Your Organization's Security.- Developing Your Security Policy.- Securing the Web Client.- Network Interconnections: A Major Point of Vulnerability.- Deterring Masqueraders and Ensuring Authenticity.- Preventing Eavesdropping to Protect your Privacy.- Thwarting Counterfeiters and Forgery to Retain Integrity.- Avoiding Disruption of Service to Maintain Availability.- Configuring Operating System and Network Security.- Enhancing Web Server Security.- Issuing and Managing Certificates.- Firewalls and Firewall Topologies.- Security Management Solutions and Future Directions.- Appendices.- Glossary.- Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 6 Customer Reviews
  • Anonymous

    Posted December 16, 2007

    A must read for web application designers

    Again, John covers his book topic in a detailed manner. As a person involved in developing tools for client/server, web and mobile applications, this book provides a good insight into the various mechanisms available as well as the threats that have to be overcome. Well done, John.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 21, 2007

    Network Security Architecture

    Internet is a significant resource for e-commerce activities as well as for dissemination of information and news. Resources on the Internet need to be secured against unauthorized access, for otherwise it could lead to loss of sensitive information resulting in business oppotunities lost. The author has laid out a systematic approach for identifying organizations security needs, and then defining security policies to safeguards those resources. The author revisits the vulnerabilities in the network protocols 'TCP/IP', and operating systems design. To remedy these vulnerabilities, tools such Intrusion Detection & Prevention, and Firewalls are prescribed. The author rightfully brings to the readers' attention that the web & domain name servers which are the heart and the soul of the Internet should be protected 24/7 from attacks such as DOS, DDOS, SYN flooding, spoofing to name the few, otherwise the services available on the Internet could be crashed. An excellent practical discussion on the use of Digital Certificates to secure and authenticate e-commerce activities is provided. Internet Security is a subject matter than can occupy volumes of written text, but the author has managed to capture the essence of practical aspects of security in one textbook, job done well. I would recommend this text to everyone that has access to Internet from home or business.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 20, 2007

    General Review

    The survival of a company or an organization these days depends on the expansion of its communications and its wider entry into the Internet and other available networks. Each additional step in this expansion further exposes the organization to its competitors and other entities that may not have the best interest of the organization in mind. For this reason security of its network and the development of its network¿s security policy should be the first step in its plan to use any network such as the Internet. This book is a well-written document and a good resource for those who are responsible for developing a practical approach in developing the needed security policy and its implementation.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 9, 2007

    Implement a secure workable internet

    After reading John Vacca¿s book you will be able to implement a workable internet security policy to protect your computer information from theft, mischievous damage and unwanted intrusion. John gives real world examples and scenarios for you to learn which countermeasure to uses to stop a potential attack. This book is valuable to anyone using an internet website for them to be able to understand the types of external danger that could be inflicted to their computer assets. It is a well organized fifteen part book which provides you a step-by-step approach for your internet security needs and knowledge. John book also provides you an extensive security glossary of wireless and internet network terms and acronyms for your complete understanding of the latest terminology.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 4, 2007

    'Got internet?' - You NEED this book

    After reading this book ANYONE would have a very good understanding of internet security. Vacca explains how to start up and then intergrate security to there network He address many different approches to keep internet networks secure. Many examples and scenarios are used. How to keep the 'bad guys' away is well covered throughout. Discussions on present as well as future problem solutions are very well discussed and covered. If you 'GOT INTERNET' you MUST read this book.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 23, 2007

    Great Text On Internet Security

    This book covers the enitre range of internet security issues from the identification of threats, development and maintenance of web servers and firewalls as well as a discussion of future technologies that will improve internet security. This text is highly recommended for the networking professional and anyone planning to conduct business on the internet.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 6 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)