Maximum security :
Published by : Techmedia, (New Delhi :) Physical details: xxxi, 885 p. : ill. ; 23 cm. + ISBN:8176350397. Year: 1997| Item type | Current location | Call number | Copy number | Status | Date due | Barcode |
|---|---|---|---|---|---|---|
Books
|
National Centre for Radio Astrophysics
Welcome to NCRA- WEB OPAC |
681.324/ANO (Browse shelf) | 10849 | Available | 10849 |
Browsing National Centre for Radio Astrophysics Shelves , Shelving location: General Stacks Close shelf browser
|
|
|
|
|
|
|
||
| 681.324:621.39/CRU Kermit, a file transfer protocol / | 681.324/ALL The CERT guide to system and network security practices / | 681.324/AMO E-business revolution : | 681.324/ANO Maximum security : | 681.324/AXE Embedded ethernet and internet complete : | 681.324/BAR SSH, the secure shell : | 681.324/CAM The student's guide to doing research on internet / |
Includes bibliographical references and index.
I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants --
D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law.

Books
There are no comments for this item.