Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous - 3rd ed. - Indianapolis, Ind. : Sams, c2001 - xxiii, 861 p. ; 23 cm. + 1 electronic optical disc (CD-ROM) (4 3/4 in.)

Pt. 1. Setting the Stage. 1. Why This Book Was Written. 2. How to Use This Book. - Pt. II. Security Concepts. 3. Building a Roadmap for Securing Your Enterprise. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. The State of the Net: A World at War. - Pt. III. Hacking 101: The Tricks of the Trade. 7. Spoofing Attacks. 8. Hiding One's Identity. 9. Dispelling Some of the Myths. - Pt. IV. The Defender's Toolkit. 10. Firewalls. 11. Vulnerability Assessment Tools (Scanners). 12. Intrusion Detection Systems (IDSs). 13. Logging and Auditing Tools. 14. Password Crackers. 15. Sniffers. - Pt. V. Virtual Weapons of Mass Destruction. 16. Denial of Service Attacks. 17. Viruses and Worms. 18. Trojans. - Pt. IV. Platforms and Security. 19. Microsoft. 20. UNIX. 21. Novell. 22. Cisco Routers and Switches. 23. Macintosh. - Pt. VII. Bringing It All Together. 25. Mining the Data Monster. 26. Policies, Procedures, and Enforcement. 27. Internal Security. 28. Network Architecture Considerations. 29. Secure Application Development, Languages, and Extensions. - Pt. VIII. Appendixes. A. Security Bibliography, Further Reading. B. Internet. C. How to Get More Information. D. Security Consultants. E. Vendor Information and Security Standards. F. What's on the CD-ROM. G. Security Glossary. - Index.

0672318717


Computer networks--Security measures.
Computer security.

005.8 / MAX