Click on a thumbnail to go to Google Books.
Loading... Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Editionby John Chirillo
None Loading...
Sign up for LibraryThing to find out whether you'll like this book. No current Talk conversations about this book. The content of this book is still relevant, and covers almost all aspects of network security. The attached CD-ROM includes Tiger security testing software. ( ) no reviews | add a review
Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more. No library descriptions found. |
Current DiscussionsNone
Google Books — Loading... GenresMelvil Decimal System (DDC)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityLC ClassificationRatingAverage:
Is this you?Become a LibraryThing Author. |