At nearly 900 pages, this volume is not only an excellent reference source, but also a testimony to the sheer volume of techniques available to those who wish to illicitly gain access to systems. If you’re a system administrator, this book will, quite simply, scare you silly–and it should. It will also help you take preventative steps that will ultimately allow you a well-deserved peace of mind. An included CD-ROM contains a selection of security utilities, such as SAFEsuite, a demo of PORTUS Secure Firewall, and the famous SATAN (Security Administrator Tool for Analyzing Networks), which are all discussed within the book. –This text refers to an out of print or unavailable edition of this title.
From Library Journal
Network administrators need to read this book closely because a lot of aspiring hackers will be reading it closely and will be looking around for somewhere to practice their new skills, e.g., your lan or web server. This book covers in copious detail internet warfare, programming languages, scanners, sniffers, password crackers, trojans, platform security, remote attacks, spoofing, firewalls, and the law. It is a how-to protect book and, by default, a how-to attack book.
Copyright 1997 Reed Business Information, Inc. –This text refers to an out of print or unavailable edition of this title.
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
Book Info
A complete guide to hacker-proofing an Internet site and computer network, written by an anonymous computer hacker. Features coverage of all main issues, from Internet warfare to firewalls. The CD-ROM features software and utilities for securing a computer network and Internet site, configured for Windows, Unix, and Mac. Softcover. –This text refers to an out of print or unavailable edition of this title.
From the Publisher
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their networkand work toward a solution to those problems. - Explores the most commonly used hacking techniques so users can safeguard their system
- Covers all computing platforms
- Includes step-by-step lists and discussions of the vulnerabilities inherent in each operating system on the market –This text refers to an out of print or unavailable edition of this title.
From the Back Cover
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
About the Author
Anonymous is an experienced computer hacker who specializes in testing security of various networking platforms. He was convicted of a series of financial crimes in the late 1980s and now works as a writer, trainer, and security consultant.
Billy Barron (billy@metronet.com) is an architect and developer of security products for Avatier Corporation. Previously, he worked as the architect of a storage resource management product,as a Java/OO consultant and as a Unix/VMS system administrator. He founded the Java Metroplex User Group (JavaMUG javamug.org/) and was the first webmaster in the Dallas/Fort Worth area. He has co-authored and tech edited numerous books including Maximum Security, Web Programming Unleashed, Tricks of the Internet Gurus, Maximum Java 1.1, Web Commerce Unleashed, Creating Web Applets with Java, and Internet Unleashed.
Greg Shipley is CTO for Neohapsis, an information security consultancy. He is a contributing editor with Network Computing magazine.
Jonathan Feldman is a contributing editor with Network Computing magazine, where he writes a column and frequently contributes technical workshops.,/P>
Robert Blader works at the Naval Surface Warfare Center, where he performs intrusion detection, security training, and network forensics. He has contributed to SANS GIAC courses and SysAdmin magazine.
Chad Cook has worked for ten years in security, with emphasis on secure product architecture, network and operating system security, and new security technologies.
David Harley maintains a number of virus and security related information resources and writes regularly for Virus Bulletin.
Joe Jenkins is a system administrator/security consultant with NoWalls, Inc. and writes for magazines such as SecurityFocus.
L.J. Locher is a network adminstrator, programmer, and security consultant who has written articles for Windows 2000 Magazine.
Toby Miller is a security engineer for Advanced Systems Development and is the author of several papers published for SecurityFocus and the SANS Institute.
Brooke Paul works as an information technology and security consultant.
Nicholas Raba is a well-known expert on Macintosh security.
Gregory White is Vice President of profession services at SecureLogix, and is a former professor of computer science at the US Air Force Academy.
Uploading.com
Uploadbox.com
DepositFiles.com