Record ID | ia:networksecurityh02edunse |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/networksecurityh02edunse/networksecurityh02edunse_marc.xml |
Download MARC binary | https://www.archive.org/download/networksecurityh02edunse/networksecurityh02edunse_meta.mrc |
LEADER: 03583cam 2200505 a 4500
001 ocm76138718
003 OCoLC
005 20191224135713.0
008 061116s2007 caua 001 0 eng c
040 $aNRC$beng$cNRC$dBAKER$dYDXCP$dUMC$dXVF$dBTCTA$dHALAN$dZHP$dOCLCF$dOCLCO$dOCLCQ$dOCLCO$dOCLCQ$dCSJ$dOCLCA$dOCLCQ$dBRL$dV5E$dGDC$dOCLCQ
020 $a0596527632$q(pbk.)
020 $a9780596527631$q(pbk.)
035 $a(OCoLC)76138718
042 $apcc
050 4 $aTK5105.59$b.L63 2007
080 $a004.738.5$bL63
082 04 $a005.8 LOC
100 1 $aLockhart, Andrew.
245 10 $aNetwork security hacks /$cAndrew Lockhart.
250 $a2nd ed.
260 $aSebastopol, CA :$bO'Reilly,$c©2007.
300 $axx, 455 :$billustrations ;$c23 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
490 1 $aHacks series
500 $aIncludes index.
500 $a"Tips & tools for protecting your privacy"--Cover.
505 00 $gChapter 1$tUnix Host Security$g1 --$gChapter 2$tWindows Host Security$g58 --$gChapter 3$tPrivacy and Anonymity$g91 --$gChapter 4$tFirewalling$g117 --$gChapter 5$tEncrypting and Securing Services$g158 --$gChapter 6$tNetwork Security$g183 --$gChapter 7$tWireless Security$g236 --$gChapter 8$tLogging$g250 --$gChapter 9$tMonitoring and Trending$g282 --$gChapter 10$tSecure Tunnels$g301 --$gChapter 11$tNetwork Intrusion Detection$g348 --$gChapter 12$tRecovery and Response$g413.
520 $aThis new edition shows you how to detect the presence (and track every keystroke) of network intruders, protect your network and data using strong encryption, and even lay traps for would-be system crackers. Bigger, broader, and more useful than the original, this edition presents 125 real-world tools and techniques that experts use to harden their defenses against attackers. You'll learn how to: Take back your privacy by evading network traffic analysis and encrypting email, Share your wireless network through a captive portal, or lock it down with fine-grained authentication, Set up virtual networks (honeypots) to divert and confuse attackers, Harden your Linux, BSD, and Windows hosts against attack, Monitor your network and services with advanced Intrusion Detection Systems, Securely connect two remote sites over the Internet using strong VPN solutions, Detect, respond to, and recover from inevitable system compromises. To get the most effective security tools, you need to learn the latest techniques that attackers are using. This is the book that will give you the information you need for keeping your network safe and secure.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
776 08 $iOnline version:$aLockhart, Andrew.$tNetwork security hacks.$b2nd ed.$dSebastopol, CA : O'Reilly, ©2007$w(OCoLC)607890672
776 08 $iOnline version:$aLockhart, Andrew.$tNetwork security hacks.$b2nd ed.$dSebastopol, CA : O'Reilly, ©2007$w(OCoLC)609522007
830 0 $aHacks series.
938 $aBaker & Taylor$bBKTY$c29.99$d22.49$i0596527632$n0006887485$sactive
938 $aBaker and Taylor$bBTCP$nbl2006030425
938 $aYBP Library Services$bYANK$n2495090
029 1 $aUNITY$b108083012
029 1 $aYDXCP$b2495090
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 132 OTHER HOLDINGS