Normal view MARC view ISBD view

Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Publisher: Indianapolis, Ind. : Sams, c2001Edition: 3rd ed.Description: xxiii, 861 p. ; 23 cm. + 1 electronic optical disc (CD-ROM) (4 3/4 in.).ISBN: 0672318717.Subject(s): Computer networks -- Security measures | Computer securityDDC classification: 005.8
Contents:
Pt. 1. Setting the Stage. 1. Why This Book Was Written. 2. How to Use This Book. - Pt. II. Security Concepts. 3. Building a Roadmap for Securing Your Enterprise. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. The State of the Net: A World at War. - Pt. III. Hacking 101: The Tricks of the Trade. 7. Spoofing Attacks. 8. Hiding One's Identity. 9. Dispelling Some of the Myths. - Pt. IV. The Defender's Toolkit. 10. Firewalls. 11. Vulnerability Assessment Tools (Scanners). 12. Intrusion Detection Systems (IDSs). 13. Logging and Auditing Tools. 14. Password Crackers. 15. Sniffers. - Pt. V. Virtual Weapons of Mass Destruction. 16. Denial of Service Attacks. 17. Viruses and Worms. 18. Trojans. - Pt. IV. Platforms and Security. 19. Microsoft. 20. UNIX. 21. Novell. 22. Cisco Routers and Switches. 23. Macintosh. - Pt. VII. Bringing It All Together. 25. Mining the Data Monster. 26. Policies, Procedures, and Enforcement. 27. Internal Security. 28. Network Architecture Considerations. 29. Secure Application Development, Languages, and Extensions. - Pt. VIII. Appendixes. A. Security Bibliography, Further Reading. B. Internet. C. How to Get More Information. D. Security Consultants. E. Vendor Information and Security Standards. F. What's on the CD-ROM. G. Security Glossary. - Index.
Item type Current location Call number Vol info Copy number Status Notes Date due Barcode Remark
Main Collection Taylor's Library-TU
005.8 MAX (Browse shelf) 1 Available SOCIT,15009,03,GR 1000116558
Accompanying Material (Media Resource) TU External Storage-LCS
005.8 MAX (Browse shelf) CD-ROM 1 Available SOCIT,15009,03,GR 1000116557 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Pt. 1. Setting the Stage. 1. Why This Book Was Written. 2. How to Use This Book. - Pt. II. Security Concepts. 3. Building a Roadmap for Securing Your Enterprise. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. The State of the Net: A World at War. - Pt. III. Hacking 101: The Tricks of the Trade. 7. Spoofing Attacks. 8. Hiding One's Identity. 9. Dispelling Some of the Myths. - Pt. IV. The Defender's Toolkit. 10. Firewalls. 11. Vulnerability Assessment Tools (Scanners). 12. Intrusion Detection Systems (IDSs). 13. Logging and Auditing Tools. 14. Password Crackers. 15. Sniffers. - Pt. V. Virtual Weapons of Mass Destruction. 16. Denial of Service Attacks. 17. Viruses and Worms. 18. Trojans. - Pt. IV. Platforms and Security. 19. Microsoft. 20. UNIX. 21. Novell. 22. Cisco Routers and Switches. 23. Macintosh. - Pt. VII. Bringing It All Together. 25. Mining the Data Monster. 26. Policies, Procedures, and Enforcement. 27. Internal Security. 28. Network Architecture Considerations. 29. Secure Application Development, Languages, and Extensions. - Pt. VIII. Appendixes. A. Security Bibliography, Further Reading. B. Internet. C. How to Get More Information. D. Security Consultants. E. Vendor Information and Security Standards. F. What's on the CD-ROM. G. Security Glossary. - Index.