Scientific Information Resource Centre, NCRA-TIFR

Maximum security : a hacker's guide to protecting your Internet site and network / Anonymous. - 2nd ed. - New Delhi : Techmedia, 1997. - xxxi, 885 p. : ill. ; 23 cm. +

Includes bibliographical references and index.

Setting the Stage. Why Did I Write This Book? How to Use This Book -- Understanding the Terrain. Birth of a Network: The Internet. A Brief Primer on TCP/IP. Hackers and Crackers. Just Who Can Be Hacked, Anyway? Internet Warfare. Security Concepts -- Tools. Destructive Devices. Scanners. Password Crackers. Trojans. Sniffers. Firewalls. Logging and Audit Tools -- Platforms and Security. The Hole. Microsoft. UNIX: The Big Kahuna. Novell. VAX/VMS. Macintosh -- Beginning at Ground Zero. Who's in Charge? Internal Security -- The Remote Attack. The Remote Attack. Levels of Attack. Spoofing Attacks. Telnet-Based Attacks. Languages, Extensions, and Security. Hiding Your Identity -- Appendixes -- Security Bibliography - Further Reading -- How to Get More Information -- Security Consultants -- I. 1. 2. II. 3. 4. 5. 6. 7. 8. III. 9. 10. 11. 12. 13. 14. 15. IV. 16. 17. 18. 19. 20. 21. V. 22. 23. VI. 24. 25. 26. 27. 28. 29. VII. A. B. C. Reference Documents Linked on the CD-ROM -- Reality Bytes: Computer Security and the Law. D. E.

8176350397


Computer security.
Computer networks--Security measures.

QA76.9.A25 / M39 1997

005.8