Foto 1 di 1

Galleria
Foto 1 di 1

Inside Internet Security : What Hackers Don't Want You to Know by Jeff Crume...
US $8,99
CircaEUR 7,83
Condizione:
Nuovo
Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o danneggiate. Per maggiori dettagli, consulta l'inserzione del venditore.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Macon, Georgia, Stati Uniti
Consegna:
Consegna prevista tra il mar 24 giu e il lun 30 giu a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:266482370421
Specifiche dell'oggetto
- Condizione
- Country/Region of Manufacture
- United States
- ISBN
- 9780201675160
Informazioni su questo prodotto
Product Identifiers
Publisher
Addison Wesley Professional
ISBN-10
0201675161
ISBN-13
9780201675160
eBay Product ID (ePID)
1751964
Product Key Features
Number of Pages
288 Pages
Publication Name
Inside Internet Security : What Hackers Don't Want You to Know
Language
English
Subject
Security / Online Safety & Privacy, Computer Science, Networking / Vendor Specific
Publication Year
2000
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
0.7 in
Item Weight
14.4 Oz
Item Length
9 in
Item Width
7.2 in
Additional Product Features
Intended Audience
Scholarly & Professional
Dewey Edition
21
Reviews
"This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on." Computing, August 2001 This one is a must if security is on your agenda. nternet works, September 2001, "This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on." Computing, August 2001 This one is a must if security is on your agenda. nternet works, September 2001
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Table of Contents I. SIZING UP THE SITUATION: SECURITY CONCEPTS. 1. Bringing down the Net 2. Is it safe? 3. What is a hacker? 4. Analyzing the risks (and counting the costs) 5. The role of policy 6. Putting all the pieces together II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you 8. Hackers don't want you to know that ... firewalls are just the beginning 9. Hackers don't want you to know that...not all the bad guys are 'out there' 10. Hackers don't want you to know that ... humans are the weakest link 11. Hackers don't want you to know that ... passwords aren't secure 12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable 14. Hackers don't want you to know that ... defaults are dangerous 15. Hackers don't want you to know that ... it takes a thief to catch a thief 16. Hackers don't want you to know that ... attacks are getting easier 17. Hackers don't want you to know that ... virus protection is inadequate 18. Hackers don't want you to know that ... active content is more active than you think 19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto 20. Hackers don't want you to know that ... the back door is open 21. Hackers don't want you to know that ... there's no such thing as a harmless attack 22. Hackers don't want you to know that ... information is your best defence 23. Hackers don't want you to know that ... the future of hacking is bright Appendix A: Crypto tutorialAppendix B: VPN tutorial Glossary Bibliography Index
Synopsis
This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence. It is a practical reference book for anyone designing or administering a corporate or eBusiness network which runs across a number of platforms via the Internet. It aims to arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of eBusiness. *practical hands-on advice on securing network systems *security checklists for each scenario *detailed pointers to other detailed information sources *in-depth theoretical background information *Multi-platform coverage *Unique external source of info on IBM systems *Wide use of diagrams and illustrations, This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence, This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize the tremendous potential of e-business. With the explosion growth of e-commerce and the opening up of corporate networks to external customers, security is now the number one issue for networking professionals. Concerns about hackers and the possible damage they can do to a business, and the potential vulnerabilities of a system can be overwhelming and can create an unhealthy business environment. However, a great deal of this is based on lack of information as to exactly how hackers approach their task, and of the exact vulnerabilities that they prey on. In this book, Jeff Crume dispels this fear by putting these threats into perspective and allowing realistic defense mechanisms to be created, to the extent that security becomes a business enabler, rather than inhibitor. Inside Internet Security describes the underlying principles that crop up again and again in hacker attacks, and then progresses to focus on lessons that can be learned, and how to protect against recurrence. Features: Practical hands-on advice on securing networked systems Security checklists for common scenarios Pointers to other detailed information sources In-depth theoretical background information Real-world Examples of actual attacks A glimpse into the future of IT security
LC Classification Number
QA75
Descrizione dell'oggetto fatta dal venditore
Informazioni su questo venditore
CMyBooks2
100% di Feedback positivi•4,9 mila oggetti venduti
Registrato come venditore privatoPertanto non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Scopri di piùScopri di più
Feedback sul venditore (2.135)
- 9***k (248)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoGenerally as described, with small stain at back ?food stain. Thin booklet rather than a book. Reasonable price for the scarcity of the booklet. However, shipping fee seems quite high for a thin booklet to Australia ($15.57 USD). I assume EBAY makes money on the shipping. Arrived within expected time (16 days). Happy with seller. Thanks10 commandments for financial freedom by John Haggai (Paperback, 2003) (N° 267141986880)
- *****- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoCool item, good price, fast ship, well packed, exactly as described, great seller, highly recommended, many thanks!
- s***e (35)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoFast response. Items came as described and packaged great.
Vedi altro:
- Riviste di informatica e internet,
- Riviste di informatica e internet in italiano,
- Riviste di informatica e internet mensile,
- Riviste di informatica e internet in inglese,
- Narrativa per bambini e ragazzi, in internet,
- Riviste di informatica e internet mensile in italiano,
- Libri e riviste per bambini e ragazzi, in internet