Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

Overview

Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system.
* Author provides the benefit of his day-to-day practices as a security expert.
* Companion Website features several non-shareware products for effectively defending against malicious code.
Read More Show Less
... See more details below
Paperback
$29.60
BN.com price
(Save 26%)$40.00 List Price
Other sellers (Paperback)
  • All (14) from $1.99   
  • New (4) from $17.40   
  • Used (10) from $1.99   
Sending request ...

Overview

Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system.
* Author provides the benefit of his day-to-day practices as a security expert.
* Companion Website features several non-shareware products for effectively defending against malicious code.
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
There’s a whole menagerie of evil zeroes and ones that mean you harm. Your adversaries are weaving worms, Trojan horse backdoors, and viruses into wondrous packages of joy. They’re learning faster than ever. Are you learning new ways to defend yourself?

In this book, Douglas Schweitzer offers a complete, up-to-date guide for network administrators who need to protect their systems against whatever the bad guys cook up next. Schweitzer begins with a little theory and a little psychology: who’s causing the trouble, why they do it, and where you’re most vulnerable. (The locus of malicious code attacks keeps changing; for instance, many netadmins were caught unaware by attacks made through instant messaging systems.)

Schweitzer’s practical solutions range from new policies to new technologies. He points you to dozens of protective tools you probably never heard of (like CookieWall, which acts as a firewall for risky cookies, and SurfinGuard Pro for Windows, which runs downloaded or HTML-embedded scripts inside their own controlled “sandbox” environment, away from critical operating system components (a comparable free package for Linux, sbox, is also available). Ignoring malicious code won’t make it go away. This book will help you fight back. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780764549588
  • Publisher: Wiley
  • Publication date: 10/3/2002
  • Edition number: 1
  • Pages: 360
  • Product dimensions: 9.25 (w) x 7.50 (h) x 0.75 (d)

Meet the Author

Douglas Schweitzer, A+, Network+, i-Net+, CCNA, CIW, Brainbench Internet Security Certi?ed, is vice-president at an actuarial consulting ?rm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy.
Read More Show Less

Table of Contents

Acknowledgments.

Introduction.

Part I: Threat Analysis.

Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses.

Chapter 2: Virus Writers and Hackers: Architects of Digital Disease.

Chapter 3: Other Digital Threats to Your Organization.

Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code.

Part II: Applied Tactics for Malicious Code Defense.

Chapter 5: Fundamentals Needed for Digital Security.

Chapter 6: Networking and Internet Essentials.

Chapter 7: Internet Relay Chat (IRC), I-Seek-You (ICQ), Web Page Chat, and Instant Messaging.

Chapter 8: Defending Your Company's Network Using Human Resources.

Chapter 9: Hardware and Software Protective Measures.

Chapter 10: Server-Side Exploits.

Part III: Looking Ahead.

Chapter 11: Cyberterrorism and Hacktivism-New Millennium, New Threats.

Chapter 12: Cyberforensics and the Future of Virus Warfare.

Appendix A: What's on the Web Site.

Appendix B: Cybercrime before Congress.

Appendix C: It's Not Just Fun and "War Games"-Juveniles and Computer Crime.

Appendix D: National Infrastructure Protection Center Statement on Cybersecurity

Appendix E: National Infrastructure Protection Center Statement on Cybercrime.

Appendix F: Glossary-Worm Words and Virus Vocabulary.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted October 27, 2002

    Nice Job

    I was extremely happy to find this book. The book adressed almost all of my concerns about the various types of attacks that I've been concerned with, and several others that I hadn't even imagined. The author does an excellent job of communicating his knowledge and experience. Highly recommended!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 16, 2002

    Required reading for the owner of every internet connected computer

    This book succeeds in explaining how an arsenal at the disposal of malicious intruders just beckons at the gate for the internet connected computer. Some of the information that could be effective in the defense is presented in a comprehendible manner. It is a worthwhile book for either the novice or the experienced. Highly recommended reading.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 18, 2002

    Concise, Complete

    This book is both informative, and well written. It is well worth the money. The ultimate source for combatting malicious code.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)