Warehouse Stock Clearance Sale

Grab a bargain today!


Inside Internet Security
By

Rating

Product Description
Product Details

Table of Contents

Table of Contents I. SIZING UP THE SITUATION: SECURITY CONCEPTS. 1. Bringing down the Net 2. Is it safe? 3. What is a hacker? 4. Analyzing the risks (and counting the costs) 5. The role of policy 6. Putting all the pieces together II. THE HACKER'S EDGE: INTERNET SECURITY VULNERABILITIES7. What you don't know can hurt you 8. Hackers don't want you to know that ... firewalls are just the beginning 9. Hackers don't want you to know that...not all the bad guys are 'out there' 10. Hackers don't want you to know that ... humans are the weakest link 11. Hackers don't want you to know that ... passwords aren't secure 12. Hackers don't want you to know that ... they can see you but you can't see them13. Hackers don't want you to know that ... downlevel software is vulnerable 14. Hackers don't want you to know that ... defaults are dangerous 15. Hackers don't want you to know that ... it takes a thief to catch a thief 16. Hackers don't want you to know that ... attacks are getting easier 17. Hackers don't want you to know that ... virus protection is inadequate 18. Hackers don't want you to know that ... active content is more active than you think 19. Hackers don't want you to know that ... yesterday's strong crypto is today's weak crypto 20. Hackers don't want you to know that ... the back door is open 21. Hackers don't want you to know that ... there's no such thing as a harmless attack 22. Hackers don't want you to know that ... information is your best defence 23. Hackers don't want you to know that ... the future of hacking is bright Appendix A: Crypto tutorialAppendix B: VPN tutorial Glossary Bibliography Index

About the Author

Jeff Crume is a Certified Information Systems Security Professional (CISSP) with 18 years experience as a programmer, software designer and IT security specialist working for IBM and its Tivoli Systems subsidiary. He has consulted with companies around the world as they develop secure e-commerce payment systems and designed networking infrastructures intended for e-business. He is a frequent speaker at international conferences and has published articles on cryptography and virtual private networking.

Reviews

"This is a practical security guide for anyone building or administering a corporate network that runs across a number of platforms, via the Internet. Crume focuses on how hackers approach their work and the vulnerabilities they prey on." Computing, August 2001 This one is a must if security is on your agenda. nternet works, September 2001

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Web » General
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
Home » Books » Computers » Security
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top