Maximum security : a hacker's guide to protecting your Internet site and network /
Anonymous.
- 2nd ed.
- New Delhi : Techmedia, 1997.
- xxxi, 885 p. : ill. ; 23 cm. +
Includes bibliographical references and index.
Setting the Stage. Why Did I Write This Book? How to Use This Book -- Understanding the Terrain. Birth of a Network: The Internet. A Brief Primer on TCP/IP. Hackers and Crackers. Just Who Can Be Hacked, Anyway? Internet Warfare. Security Concepts -- Tools. Destructive Devices. Scanners. Password Crackers. Trojans. Sniffers. Firewalls. Logging and Audit Tools -- Platforms and Security. The Hole. Microsoft. UNIX: The Big Kahuna. Novell. VAX/VMS. Macintosh -- Beginning at Ground Zero. Who's in Charge? Internal Security -- The Remote Attack. The Remote Attack. Levels of Attack. Spoofing Attacks. Telnet-Based Attacks. Languages, Extensions, and Security. Hiding Your Identity -- Appendixes -- Security Bibliography - Further Reading -- How to Get More Information -- Security Consultants -- I. 1. 2. II. 3. 4. 5. 6. 7. 8. III. 9. 10. 11. 12. 13. 14. 15. IV. 16. 17. 18. 19. 20. 21. V. 22. 23. VI. 24. 25. 26. 27. 28. 29. VII. A. B. C. Reference Documents Linked on the CD-ROM -- Reality Bytes: Computer Security and the Law. D. E.
8176350397
Computer security.
Computer networks--Security measures.
QA76.9.A25 / M39 1997
005.8
Includes bibliographical references and index.
Setting the Stage. Why Did I Write This Book? How to Use This Book -- Understanding the Terrain. Birth of a Network: The Internet. A Brief Primer on TCP/IP. Hackers and Crackers. Just Who Can Be Hacked, Anyway? Internet Warfare. Security Concepts -- Tools. Destructive Devices. Scanners. Password Crackers. Trojans. Sniffers. Firewalls. Logging and Audit Tools -- Platforms and Security. The Hole. Microsoft. UNIX: The Big Kahuna. Novell. VAX/VMS. Macintosh -- Beginning at Ground Zero. Who's in Charge? Internal Security -- The Remote Attack. The Remote Attack. Levels of Attack. Spoofing Attacks. Telnet-Based Attacks. Languages, Extensions, and Security. Hiding Your Identity -- Appendixes -- Security Bibliography - Further Reading -- How to Get More Information -- Security Consultants -- I. 1. 2. II. 3. 4. 5. 6. 7. 8. III. 9. 10. 11. 12. 13. 14. 15. IV. 16. 17. 18. 19. 20. 21. V. 22. 23. VI. 24. 25. 26. 27. 28. 29. VII. A. B. C. Reference Documents Linked on the CD-ROM -- Reality Bytes: Computer Security and the Law. D. E.
8176350397
Computer security.
Computer networks--Security measures.
QA76.9.A25 / M39 1997
005.8