Inside Internet Security - Jeff Crume

Inside Internet Security

What Hackers Don't Want You To Know

(Autor)

Buch | Softcover
288 Seiten
2000
Addison Wesley (Verlag)
978-0-201-67516-0 (ISBN)
69,40 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This book describes the underlying principles that crop up again and again in hacker attacks, and then focusses on lessons that can be learned, and on how to protect against recurrence
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize the tremendous potential of e-business. With the explosion growth of e-commerce and the opening up of corporate networks to external customers, security is now the number one issue for networking professionals. Concerns about hackers and the possible damage they can do to a business, and the potential vulnerabilities of a system can be overwhelming and can create an unhealthy business environment. However, a great deal of this is based on lack of information as to exactly how hackers approach their task, and of the exact vulnerabilities that they prey on. In this book, Jeff Crume dispels this fear by putting these threats into perspective and allowing realistic defense mechanisms to be created, to the extent that security becomes a business enabler, rather than inhibitor.
Inside Internet Security describes the underlying principles that crop up again and again in hacker attacks, and then progresses to focus on lessons that can be learned, and how to protect against recurrence. Features: Practical hands-on advice on securing networked systems Security checklists for common scenarios Pointers to other detailed information sources In-depth theoretical background information Real-world Examples of actual attacks A glimpse into the future of IT security

Jeff Crume is a Certified Information Systems Security Professional (CISSP) with 18 years experience as a programmer, software designer and IT security specialist working for IBM and its Tivoli Systems subsidiary. He has consulted with companies around the world as they develop secure e-commerce payment systems and designed networking infrastructures intended for e-business. He is a frequent speaker at international conferences and has published articles on cryptography and virtual private networking.

Table of Contents I. SIZING UP THE SITUATION: SECURITY CONCEPTS. 1. Bringing down the Net 2. Is it safe? 3. What is a hacker? 4. Analyzing the risks (and counting the costs) 5. The role of policy 6. Putting all the pieces together II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you 8. Hackers don't want you to know that ... firewalls are just the beginning 9. Hackers don't want you to know that...not all the bad guys are 'out there' 10. Hackers don't want you to know that ... humans are the weakest link 11. Hackers don't want you to know that ... passwords aren't secure 12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable 14. Hackers don't want you to know that ... defaults are dangerous 15. Hackers don't want you to know that ... it takes a thief to catch a thief 16. Hackers don't want you to know that ... attacks are getting easier 17. Hackers don't want you to know that ... virus protection is inadequate 18. Hackers don't want you to know that ... active content is more active than you think 19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto 20. Hackers don't want you to know that ... the back door is open 21. Hackers don't want you to know that ... there's no such thing as a harmless attack 22. Hackers don't want you to know that ... information is your best defence 23. Hackers don't want you to know that ... the future of hacking is bright Appendix A: Crypto tutorialAppendix B: VPN tutorial Glossary Bibliography Index

Erscheint lt. Verlag 14.9.2000
Verlagsort Boston
Sprache englisch
Maße 188 x 235 mm
Gewicht 528 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 0-201-67516-1 / 0201675161
ISBN-13 978-0-201-67516-0 / 9780201675160
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00