Inside Internet Security
Material type: TextPublication details: UK Pearson Education 2000Edition: 1stISBN:- 0201675161
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Standard Loan | Thurles Library Main Collection | 005.8 CRU (Browse shelf(Opens below)) | Available | R06731KRCC | ||
Standard Loan | Thurles Library Main Collection | 005.8 CRU (Browse shelf(Opens below)) | Available | R09675KRCT | ||
Standard Loan | Thurles Library Main Collection | 005.8 CRU (Browse shelf(Opens below)) | Available | R09698KRCT | ||
Standard Loan | Thurles Library Main Collection | 005.8 CRU (Browse shelf(Opens below)) | Available | R09701KRCT |
Browsing Thurles Library shelves, Shelving location: Main Collection Close shelf browser (Hides shelf browser)
005.8 CRU Inside Internet Security | 005.8 CRU Inside Internet Security | 005.8 CRU Inside Internet Security | 005.8 CRU Inside Internet Security | 005.8 DOW The Art of Software Security Assessment | 005.8 ERI Hacking The Art of Exploitation, 2nd edit. | 005.8 ERI Hacking The Art of Exploitation, 2nd edit. |
Enhanced descriptions from Syndetics:
This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence. It is a practical reference book for anyone designing or administering a corporate or eBusiness network which runs across a number of platforms via the Internet. It aims to arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of eBusiness. *practical hands-on advice on securing network systems *security checklists for each scenario *detailed pointers to other detailed information sources *in-depth theoretical background information *Multi-platform coverage *Unique external source of info on IBM systems *Wide use of diagrams and illustrations
Table of contents provided by Syndetics
- Table of Contents
- I Sizing Up The Situation: Security Concepts
- 1 Bringing down the Net
- 2 Is it safe?
- 3 What is a hacker?
- 4 Analyzing the risks (and counting the costs)
- 5 The role of policy
- 6 Putting all the pieces together
- II The Hacker's Edge: Internet Security Vulnerabilities
- 7 What you don't know can hurt you
- 8 Hackers don't want you to know that ... firewalls are just the beginning
- 9 Hackers don't want you to know that...not all the bad guys are 'out there'
- 10 Hackers don't want you to know that ... humans are the weakest link
- 11 Hackers don't want you to know that ... passwords aren't secure
- 12 Hackers don't want you to know that ... they can see you but you can't see them
- 13 Hackers don't want you to know that ... downlevel software is vulnerable
- 14 Hackers don't want you to know that ... defaults are dangerous
- 15 Hackers don't want you to know that ... it takes a thief to catch a thief
- 16 Hackers don't want you to know that ... attacks are getting easier
- 17 Hackers don't want you to know that ... virus protection is inadequate
- 18 Hackers don't want you to know that ... active content is more active than you think
- 19 Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto
- 20 Hackers don't want you to know that ... the back door is open
- 21 Hackers don't want you to know that ... there's no such thing as a harmless attack
- 22 Hackers don't want you to know that ... information is your best defence
- 23 Hackers don't want you to know that ... the future of hacking is bright
- Appendix A Crypto tutorial
- Appendix B VPN tutorial
- Glossary
- Bibliography
- Index
Excerpt provided by Syndetics
Author notes provided by Syndetics
Jeff Crume is a Certified Information Systems Security Professional (CISSP) with 18 years experience as a programmer, software designer and IT security specialist working for IBM and its Tivoli Systems subsidiary. He has consulted with companies around the world as they develop secure e-commerce payment systems and designed networking infrastructures intended for e-business. He is a frequent speaker at international conferences and has published articles on cryptography and virtual private networking.