Maximum Security

Front Cover
Sams, 2001 - Computer networks - 861 pages
0 Reviews
Learn everything the hackers already know, and then take steps to protect your systems!

-- A new edition of the controversial, comprehensive guide to Internet and network security - revised and updated by a well-known security consultant who specializes in computer penetration testing.

-- Fully updated, revised, and expanded to cover hundreds of new developments in hacking techniques, and the latest security technologies.

-- Includes new coverage of Macintosh OS security and Cisco routers and switches, and expanded coverage of Linux security

When the first edition of this book was published in June 1997, its popularity caught everyone by surprise. The hacking community, however, never stands still - a thoroughly updated and revised edition of this book is required on a regular basis to discuss the hundreds of new computer system holes and to cover the latest techniques that hackers are developing to crack into computers and networks. With the resurgence in popularity of the Mac platform there will be a new chapter on Mac OS security. Additional new chapters include one on Cisco routers and switches, and one on mail security. Additionally, in many cases existing material will be updated and/or significantly expanded. The CD-ROM includes collection of security products, code examples, technical documents, system logs, utilities and other practical items for implementing Internet and computer system security.

What people are saying - Write a review

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

User Review  - Not Available - Book Verdict

Network administrators need to read this book closely because a lot of aspiring hackers will be reading it closely and will be looking around for somewhere to practice their new skills, e.g., your lan ... Read full review

Other editions - View all

About the author (2001)

Anonymous is an experienced computer hacker who now works as a writer, trainer, and security consultant in California. He currently runs an Internet security consulting company and does contract programming for several Fortune 500 firms. He is the author of Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation.

Bibliographic information