This title teaches specific methods for protecting all parts of a network against security breaches. It shows how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.
"synopsis" may belong to another edition of this title.
Access to networked computers is via a logical port. Hack Attacks Denied explains how to protect those you aren't using and control what goes in and out of those you do use. This forms the basis of all network computer lockdowns.
Unfortunately, implementing this simple sounding security remedy for operating systems and applications is technically difficult and complex to track. Author, John Chirillo first talks of disabling unnecessary--and potentially insecure--services such as chargen, echo and finger and then how to reduce the risks presented by those you do run. Much of Chirillo's improved security comes from replacing standard servers with limited versions supplied on the accompanying CD--complete with listings so you can see how they work.
The sections on discovery and penetration countermeasures is interesting--it even includes sample Cisco router filter scripts--but the most successful exploits are inside jobs or rely on social engineering (unwitting user co-operation). People are always the weakest security link--including sysadmins who don't apply security patches let alone lock down systems.
The emphasis on formulating and implementing a security policy is excellent, as is the advice to regularly test your security instead of just assuming it works.
Chirillo necessarily reprises much of the information in his wide ranging Hack Attacks Revealed, but the relentlessly practical approach taken to implementing network security by Hack Attacks Denied makes it an excellent network security cookbook. Read it, raise your game, and watch the black hats target someone who didn't. --Steve Patient
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!" (Kelly M. Larsen, C2Protect, DoD Security Instructor) "Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems." (L. Peterson, AFCERT) "[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review) "Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
"About this title" may belong to another edition of this title.
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00095346895
Seller: GoldBooks, Denver, CO, U.S.A.
Paperback. Condition: very good. Very Good Copy. Customer Service Guaranteed. Seller Inventory # 19E12_1_0471416258
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471416258I3N00
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471416258I4N00
Seller: Books From California, Simi Valley, CA, U.S.A.
paperback. Condition: Very Good. Seller Inventory # mon0003100018