Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers work and the best ways to respond: not just what to do, but why. Through dozens of real-world examples, you'll master the skills and mindset to protect yourself against today's attacks -- and tomorrow's.
"synopsis" may belong to another edition of this title.
"Takes on even more meaning now than the original edition!"
—Denny Georg, CTO, Information Technology, Hewlett-Packard
Secure your systems against today's attacks—and tomorrow's.
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system.
Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control—showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit—and attacks that haven't even been imagined yet.
The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.
DONALD L. PIPKIN, CISSP, is an Information Security Architect for the Internet Security Division of Hewlett-Packard who consults with many of HP's largest customers. An internationally renowned security expert with over 15 years of experience, Pipkin is a frequent speaker and presenter on security issues in regional, national, and international conferences. His areas of expertise include policy, procedures, and intrusion response. He is author of Information Security: Protecting the Global Enterprise.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.7. Seller Inventory # G0130464163I3N00
Quantity: 1 available
Seller: BoundlessBookstore, Wallingford, United Kingdom
Condition: Very Good. Very good condition paperback with minimal wear. Contents are clean and bright throughout with no markings. Seller Inventory # 9999-9992612012
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 2nd. Used book that is in clean, average condition without any missing pages. Seller Inventory # 21369103-6
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_309714464
Quantity: 1 available