Systems administrators are often unaware of the dangers presented by anything beyong the most trivial attacks. Because of the day-to-day tasks, Y2K projects, and increasingly complex technology, administrators have perpetually back-burnerer security issues out of necessity. However, recent high-profile viruses and events like the White House website being closed down by hackers has brought the issue back to the forefront. With Hacking Exposed: Network Security Secrets and Solutions, Osborne will provide administrators with a modular and approachable reference so they can select the most pertinent information, rapidly digest it, and apply it immediately.
"synopsis" may belong to another edition of this title.
Hacking Exposed High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies. Full descriptionReview:
There are dozens of books detailing the careers of malicious hackers and plenty more on security techniques. What makes Hacking Exposed different is that it combines the best of both worlds, giving you an insight into the techniques and mindset of crackers without glamorizing or mystifying what they get up to--and then telling you how to keep them out of your system by explaining exactly what they'll try to do to get in.
There are security options in every operating system and any competent sysadmin will know what they are and how to use them: you may even be able to keep up with all the service packs and patches that come out. What you probably don't know is all the potential holes in your security and the tools that will be used to try to get into your system. This book will scare you thoroughly by explaining each type of attack on your network. But it then tells you how to deal with the security hole of which each attack takes advantage. The explanations are clear and detailed and cover UNIX and Linux, Windows 95, 98 and NT (with an appendix on Windows 2000), Novell NetWare and common firewalls and mail servers too. The problem is always growing, but the coverage is reasonably up-to-date and points you at some useful resources, including the companion Web site at www.hackingexposed.com.
The obvious worry with a book like this is that it will help the crackers as much as the sysadmins it's written for. But security through obscurity is no security--and anyway all of these intrusion tools and techniques are out there on the Net already for those with the time and inclination to look for them. Learning how vulnerable your network is to password crackers and direct attacks or seeing how easily intruders can find out about your systems and take advantage of your resources--and getting a step-by-step guide to keeping them out--is your best defence. --Penny Jannifer
"About this title" may belong to another edition of this title.
Book Description Computing Mcgraw-Hill, 1999. Paperback. Book Condition: New. Bookseller Inventory # DADAX0072121270
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800721212781.0
Book Description Computing Mcgraw-Hill, 1999. Paperback. Book Condition: New. book. Bookseller Inventory # 0072121270
Book Description Computing Mcgraw-Hill, 1999. Paperback. Book Condition: New. Bookseller Inventory # P110072121270
Book Description Computing Mcgraw-Hill. PAPERBACK. Book Condition: New. 0072121270 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER. Bookseller Inventory # 0072121270
Book Description Computing Mcgraw-Hill, 1999. Paperback. Book Condition: New. New item. Bookseller Inventory # QX-003-07-0498000
Book Description Computing Mcgraw-Hill. PAPERBACK. Book Condition: New. 0072121270 New Condition. Bookseller Inventory # NEW6.1032636