Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any company or organization that is either on the Internet now or considering it. Hardly a week passes where there isn't some new report of crackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or stealing user passwords and sometimes even credit card numbers. When the first edition of this book was published in June 1997, its popularity caught everybody by surprise. It immediately shot to the top of several computer security bestseller lists, surpassing even established security books from O'Reilly, Wiley, and Addison-Wesley. While undoubtedly some bought the book to learn how to hack, it turns out that the book's most enthusiastic fans were computer security managers who appreciated the book's comprehensive coverage and clear, to-the-point descriptions of the most common techniques hackers use to penetrate systems. The hacking community, however, hasn't stood still.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Why Did I Write This Book?
73 other sections not shown
administrator advisories allows application attack authentication Author called client command Communications Computer configuration connection Contact crack cracker create database designed Detection Discussion distribution document Email encryption environment example exploit firewall functions holes host identify implementation inetd installation integrity Internet ISBN issue Linux Location machine Microsoft NOTE offers operating system packet password perform Phone platform policies port port scanner probably problem protection Protocol provides reason remote reports request require root scanner server simply sniffer solution specific Suite SunOS Table TCP/IP Telnet testing tion trojan University UNIX users utility Violation vulnerabilities Windows 95 Windows NT written XREF