TY - BOOK TI - Maximum security: [a hacker's guide to protecting your internet site and network] SN - 0672318717 U1 - 005.8 PY - 2001/// CY - Indianapolis, Ind. PB - Sams KW - Computer networks KW - Security measures KW - Computer security N1 - Pt. 1. Setting the Stage. 1. Why This Book Was Written. 2. How to Use This Book. - Pt. II. Security Concepts. 3. Building a Roadmap for Securing Your Enterprise. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. The State of the Net: A World at War. - Pt. III. Hacking 101: The Tricks of the Trade. 7. Spoofing Attacks. 8. Hiding One's Identity. 9. Dispelling Some of the Myths. - Pt. IV. The Defender's Toolkit. 10. Firewalls. 11. Vulnerability Assessment Tools (Scanners). 12. Intrusion Detection Systems (IDSs). 13. Logging and Auditing Tools. 14. Password Crackers. 15. Sniffers. - Pt. V. Virtual Weapons of Mass Destruction. 16. Denial of Service Attacks. 17. Viruses and Worms. 18. Trojans. - Pt. IV. Platforms and Security. 19. Microsoft. 20. UNIX. 21. Novell. 22. Cisco Routers and Switches. 23. Macintosh. - Pt. VII. Bringing It All Together. 25. Mining the Data Monster. 26. Policies, Procedures, and Enforcement. 27. Internal Security. 28. Network Architecture Considerations. 29. Secure Application Development, Languages, and Extensions. - Pt. VIII. Appendixes. A. Security Bibliography, Further Reading. B. Internet. C. How to Get More Information. D. Security Consultants. E. Vendor Information and Security Standards. F. What's on the CD-ROM. G. Security Glossary. - Index ER -