Network Security Hacks 2e (Anglais) Broché – 10 novembre 2006
Rentrée scolaire 2017 : découvrez notre boutique de livres, fournitures, cartables, ordinateurs, vêtements ... Voir plus.
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Les clients ayant acheté cet article ont également acheté
Description du produit
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
Commentaires client les plus utiles sur Amazon.com
Read my security blogspot at [...]
The first chapter covers UNIX security, which I already had a good background in, and taught me some lower-level kernel and file system security. The second chapter covers Windows security: The basics of encrypting folders, restricting users and checking for patches, and monitoring log files. In my opinion, this chapter was the weakest in the entire book. If you are looking for more in-depth Windows security, I suggest looking elsewhere. The rest of the book covers network security and its related components. This section is where the book really shines, covering everything from intrusion detection to logging and monitoring.
My favorite feature of this book is that it will present you with a potential security problem and then a possible solution, but then the book will ask: what if a hacker did this or that? Asking questions in this manner gives you the proper mindset you need to start securing your systems.
Chapter 1, Unix Host Security, demonstrates advanced techniques for hardening your Linux, FreeBSD, or OpenBSD server.
Chapter 2, Windows Host Security, covers many important steps that Windows administrators often overlook, including tightening down permissions, auditing all system activity, and eliminating security holes that are present in the default Windows installation.
Chapter 3, Privacy and Anonymity, discusses several ways to protect oneself online by offering solutions for encrypting email, remaining anonymous, and managing passwords for web sites.
Chapter 4, Firewalling, shows how to set up firewalls under various operating systems, such as Linux, OpenBSD, FreeBSD, and Windows. Different filtering and firewall testing techniques are also covered in this chapter.
Chapter 5, Encrypting and Securing Services, shows how provide secure services for SMTP, IMAP, POP3, Apache, and MySQL.
Chapter 6, Network Security, demonstrates some tools and techniques used to attack servers using the network itself, as well as methods for preventing these attacks.
Chapter 7, Wireless Security, includes only a handful of very useful hacks. Whether you want to share your network with others and still maintain a semblance of security, or lock down your wireless network with fine-grained authentication, this chapter has something for you.
Chapter 8, Logging, shows you how to balance the need for information with the need for brevity by automatically collecting, processing, and protecting your system logs.
Chapter 9, Monitoring and Trending, presents a number of tools and methods for watching your network and services over time, allowing you to recognize trends that will aid in future planning and enable you to tell at a glance when something just isn't right.
Chapter 10, Secure Tunnels, shows you how to implement powerful VPN technologies, including IPSec, PPTP, and OpenVPN. You will also find techniques for protecting services using SSL, SSH, and other strong encryption tools.
Chapter 11, Network Intrusion Detection, centers on the tremendously popular NIDS tool Snort and presents many techniques and add-ons that unleash this powerful tool's full potential. Also presented are methods for setting up your own "honeypot" network to attract and confuse would-be system crackers.
Chapter 12, Recovery and Response, contains suggestions on how to verify your system's integrity, preserve evidence for later analysis, and track down the human being at the other end of undesirable network traffic.
I would recommend this book to any network security professional. However, I think it is too advanced for someone who is just interested in the profession or someone who is tinkering with a home network on an amateur basis. There is no "beginner's material" to be found in this book, and it will likely be over your head if you are not already working in the field.
Rechercher des articles similaires par rubrique