TY - BOOK TI - Maximum security: a hacker's guide to protecting your Internet site and network SN - 8176350397 AV - QA76.9.A25 M39 1997 U1 - 005.8 21 PY - 1997/// CY - New Delhi PB - Techmedia KW - Computer security KW - Computer networks KW - Security measures N1 - Includes bibliographical references and index; I; Setting the Stage; 1; Why Did I Write This Book?; 2; How to Use This Book --; II; Understanding the Terrain; 3; Birth of a Network: The Internet; 4; A Brief Primer on TCP/IP; 5; Hackers and Crackers; 6; Just Who Can Be Hacked, Anyway?; 7; Internet Warfare; 8; Security Concepts --; III; Tools; 9; Destructive Devices; 10; Scanners; 11; Password Crackers; 12; Trojans; 13; Sniffers; 14; Firewalls; 15; Logging and Audit Tools --; IV; Platforms and Security; 16; The Hole; 17; Microsoft; 18; UNIX: The Big Kahuna; 19; Novell; 20; VAX/VMS; 21; Macintosh --; V; Beginning at Ground Zero; 22; Who's in Charge?; 23; Internal Security --; VI; The Remote Attack; 24; The Remote Attack; 25; Levels of Attack; 26; Spoofing Attacks; 27; Telnet-Based Attacks; 28; Languages, Extensions, and Security; 29; Hiding Your Identity --; VII; Appendixes --; A; Security Bibliography - Further Reading --; B; How to Get More Information --; C; Security Consultants --; D; Reference Documents Linked on the CD-ROM --; E; Reality Bytes: Computer Security and the Law ER -