The Resource Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
Resource Information
The item Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.This item is available to borrow from all library branches.
Resource Information
The item Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.
This item is available to borrow from all library branches.
- Language
- eng
- Edition
- 2nd ed.
- Extent
- 1 online resource (xxvii, 829 pages
- Contents
-
- I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book
- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts
- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools
- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh
- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security
- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity
- VII. Appendixes
- A. Security Bibliography - Further Reading
- B. How to Get More Information
- C. Security Consultants
- D. Reference Documents Linked on the CD-ROM
- E. Reality Bytes: Computer Security and the Law
- Label
- Maximum security : a hacker's guide to protecting your Internet site and network
- Title
- Maximum security
- Title remainder
- a hacker's guide to protecting your Internet site and network
- Statement of responsibility
- Anonymous
- Language
- eng
- Cataloging source
- DLC
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- M39 1998
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Datensicherung
- Internet
- Rechnernetz
- Label
- Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
- Accompanying material
- 1 computer laser optical disc (4 3/4 in.))
- Bibliography note
- Includes bibliographical references and index
- Contents
- I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants -- D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law
- Edition
- 2nd ed.
- Extent
- 1 online resource (xxvii, 829 pages
- Form of item
- online
- Other physical details
- ill. ;
- Specific material designation
- remote
- System control number
- (OCoLC)1036535020
- Label
- Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
- Accompanying material
- 1 computer laser optical disc (4 3/4 in.))
- Bibliography note
- Includes bibliographical references and index
- Contents
- I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants -- D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law
- Edition
- 2nd ed.
- Extent
- 1 online resource (xxvii, 829 pages
- Form of item
- online
- Other physical details
- ill. ;
- Specific material designation
- remote
- System control number
- (OCoLC)1036535020
Library Links
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Maximum-security--a-hackers-guide-to-protecting/vmUo1_zgDNc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Maximum-security--a-hackers-guide-to-protecting/vmUo1_zgDNc/">Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Maximum-security--a-hackers-guide-to-protecting/vmUo1_zgDNc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Maximum-security--a-hackers-guide-to-protecting/vmUo1_zgDNc/">Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>