|In vendita nella categoria:
Ne hai uno da vendere?

Inside Internet Security : What Hackers Don't Want You to Know by Jeff Crume...

CMyBooks2
(1701)
Registrato come venditore privato
Non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Ulteriori informazioni
US $8,99
CircaEUR 7,83
Condizione:
Nuovo
Goditi i vantaggi. Restituzioni accettate.
Non lasciartelo sfuggire. 1 persona osserva questo oggetto.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Macon, Georgia, Stati Uniti
Consegna:
Consegna prevista tra il mar 24 giu e il lun 30 giu a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Ulteriori informazioniGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:266482370421
Ultimo aggiornamento: 01 feb 2025 01:24:29 CETVedi tutte le revisioniVedi tutte le revisioni

Specifiche dell'oggetto

Condizione
Nuovo: Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o ...
Country/Region of Manufacture
United States
ISBN
9780201675160

Informazioni su questo prodotto

Product Identifiers

Publisher
Addison Wesley Professional
ISBN-10
0201675161
ISBN-13
9780201675160
eBay Product ID (ePID)
1751964

Product Key Features

Number of Pages
288 Pages
Publication Name
Inside Internet Security : What Hackers Don't Want You to Know
Language
English
Subject
Security / Online Safety & Privacy, Computer Science, Networking / Vendor Specific
Publication Year
2000
Type
Textbook
Author
Jeff Crume
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.7 in
Item Weight
14.4 Oz
Item Length
9 in
Item Width
7.2 in

Additional Product Features

Intended Audience
Scholarly & Professional
Dewey Edition
21
Reviews
"This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on." Computing, August 2001 This one is a must if security is on your agenda. nternet works, September 2001,  "This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on."  Computing, August 2001  This one is a must if security is on your agenda. nternet works, September 2001
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Table of Contents I. SIZING UP THE SITUATION: SECURITY CONCEPTS. 1. Bringing down the Net 2. Is it safe? 3. What is a hacker? 4. Analyzing the risks (and counting the costs) 5. The role of policy 6. Putting all the pieces together II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you 8. Hackers don't want you to know that ... firewalls are just the beginning 9. Hackers don't want you to know that...not all the bad guys are 'out there' 10. Hackers don't want you to know that ... humans are the weakest link 11. Hackers don't want you to know that ... passwords aren't secure 12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable 14. Hackers don't want you to know that ... defaults are dangerous 15. Hackers don't want you to know that ... it takes a thief to catch a thief 16. Hackers don't want you to know that ... attacks are getting easier 17. Hackers don't want you to know that ... virus protection is inadequate 18. Hackers don't want you to know that ... active content is more active than you think 19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto 20. Hackers don't want you to know that ... the back door is open 21. Hackers don't want you to know that ... there's no such thing as a harmless attack 22. Hackers don't want you to know that ... information is your best defence 23. Hackers don't want you to know that ... the future of hacking is bright Appendix A: Crypto tutorialAppendix B: VPN tutorial Glossary Bibliography Index
Synopsis
This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence. It is a practical reference book for anyone designing or administering a corporate or eBusiness network which runs across a number of platforms via the Internet. It aims to arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of eBusiness. *practical hands-on advice on securing network systems *security checklists for each scenario *detailed pointers to other detailed information sources *in-depth theoretical background information *Multi-platform coverage *Unique external source of info on IBM systems *Wide use of diagrams and illustrations, This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence, This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize the tremendous potential of e-business. With the explosion growth of e-commerce and the opening up of corporate networks to external customers, security is now the number one issue for networking professionals. Concerns about hackers and the possible damage they can do to a business, and the potential vulnerabilities of a system can be overwhelming and can create an unhealthy business environment. However, a great deal of this is based on lack of information as to exactly how hackers approach their task, and of the exact vulnerabilities that they prey on. In this book, Jeff Crume dispels this fear by putting these threats into perspective and allowing realistic defense mechanisms to be created, to the extent that security becomes a business enabler, rather than inhibitor. Inside Internet Security describes the underlying principles that crop up again and again in hacker attacks, and then progresses to focus on lessons that can be learned, and how to protect against recurrence. Features: Practical hands-on advice on securing networked systems Security checklists for common scenarios Pointers to other detailed information sources In-depth theoretical background information Real-world Examples of actual attacks A glimpse into the future of IT security
LC Classification Number
QA75

Descrizione dell'oggetto fatta dal venditore

Informazioni su questo venditore

CMyBooks2

100% di Feedback positivi4,9 mila oggetti venduti

Su eBay da nov 2007
In genere risponde entro 24 ore
Registrato come venditore privatoPertanto non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Scopri di piùScopri di più

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
5.0
Spese spedizione
4.9
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (2.135)

Tutti i punteggi
Positivo
Neutro
Negativo
  • 9***k (248)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Generally as described, with small stain at back ?food stain. Thin booklet rather than a book. Reasonable price for the scarcity of the booklet. However, shipping fee seems quite high for a thin booklet to Australia ($15.57 USD). I assume EBAY makes money on the shipping. Arrived within expected time (16 days). Happy with seller. Thanks
  • *****- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Cool item, good price, fast ship, well packed, exactly as described, great seller, highly recommended, many thanks!
  • s***e (35)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Fast response. Items came as described and packaged great.