Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network, Volume 1

Front Cover
Sams, 1998 - Computers - 829 pages
0 Reviews
Security continues to be the predominant concern for any company or organization that is either on the Internet now or considering it. Hardly a week passes where there isn't some new report of crackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or stealing user passwords and sometimes even credit card numbers.

When the first edition of this book was published in June 1997, its popularity caught everybody by surprise. It immediately shot to the top of several computer security bestseller lists, surpassing even established security books from O'Reilly, Wiley, and Addison-Wesley.

While undoubtedly some bought the book to learn how to hack, it turns out that the book's most enthusiastic fans were computer security managers who appreciated the book's comprehensive coverage and clear, to-the-point descriptions of the most common techniques hackers use to penetrate systems.

The hacking community, however, hasn't stood still. And a thoroughly updated and revised edition of this book is now required to discuss the hundreds of new computer system holes that have been discovered over the course of the past year, and to cover the latest techniques that hackers are now using to crack into computers and networks.

From inside the book

What people are saying - Write a review

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

User Review  - Not Available - Book Verdict

Network administrators need to read this book closely because a lot of aspiring hackers will be reading it closely and will be looking around for somewhere to practice their new skills, e.g., your lan ... Read full review

Contents

Introduction
1
Real or Imagined?
9
Why Education in Security Is Important
15
Copyright

63 other sections not shown

Other editions - View all

Common terms and phrases

About the author (1998)

The author is an experienced computer hacker who now works as a writer, trainer, Internet and Unix site manager, and security consultant in California.

Bibliographic information