Scientific Information Resource Centre, NCRA-TIFR

Normal view MARC view ISBD view

Maximum security :

Published by : Techmedia, (New Delhi :) Physical details: xxxi, 885 p. : ill. ; 23 cm. + ISBN:8176350397. Year: 1997
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Copy number Status Date due Barcode
Books Books National Centre for Radio Astrophysics

Welcome to NCRA- WEB OPAC

General Stacks
681.324/ANO (Browse shelf) 10849 Available 10849

Includes bibliographical references and index.

I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants --

D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law.

There are no comments for this item.

Log in to your account to post a comment.