The Resource Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous

Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous

Label
Maximum security : a hacker's guide to protecting your Internet site and network
Title
Maximum security
Title remainder
a hacker's guide to protecting your Internet site and network
Statement of responsibility
Anonymous
Subject
Language
eng
Cataloging source
DLC
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
M39 1998
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Datensicherung
  • Internet
  • Rechnernetz
Label
Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
Link
Instantiates
Publication
Accompanying material
1 computer laser optical disc (4 3/4 in.))
Bibliography note
Includes bibliographical references and index
Contents
I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants -- D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law
Edition
2nd ed.
Extent
1 online resource (xxvii, 829 pages
Form of item
online
Other physical details
ill. ;
Specific material designation
remote
System control number
(OCoLC)1036535020
Label
Maximum security : a hacker's guide to protecting your Internet site and network, Anonymous
Link
Publication
Accompanying material
1 computer laser optical disc (4 3/4 in.))
Bibliography note
Includes bibliographical references and index
Contents
I. Setting the Stage. 1. Why Did I Write This Book? 2. How to Use This Book -- II. Understanding the Terrain. 3. Birth of a Network: The Internet. 4. A Brief Primer on TCP/IP. 5. Hackers and Crackers. 6. Just Who Can Be Hacked, Anyway? 7. Internet Warfare. 8. Security Concepts -- III. Tools. 9. Destructive Devices. 10. Scanners. 11. Password Crackers. 12. Trojans. 13. Sniffers. 14. Firewalls. 15. Logging and Audit Tools -- IV. Platforms and Security. 16. The Hole. 17. Microsoft. 18. UNIX: The Big Kahuna. 19. Novell. 20. VAX/VMS. 21. Macintosh -- V. Beginning at Ground Zero. 22. Who's in Charge? 23. Internal Security -- VI. The Remote Attack. 24. The Remote Attack. 25. Levels of Attack. 26. Spoofing Attacks. 27. Telnet-Based Attacks. 28. Languages, Extensions, and Security. 29. Hiding Your Identity -- VII. Appendixes -- A. Security Bibliography - Further Reading -- B. How to Get More Information -- C. Security Consultants -- D. Reference Documents Linked on the CD-ROM -- E. Reality Bytes: Computer Security and the Law
Edition
2nd ed.
Extent
1 online resource (xxvii, 829 pages
Form of item
online
Other physical details
ill. ;
Specific material designation
remote
System control number
(OCoLC)1036535020

Library Locations

  • Internet ArchiveBorrow it
    300 Funston Ave, San Francisco, CA, 94118, US
    37.7823215 -122.4716373

Library Links

Processing Feedback ...