This specific ISBN edition is currently not available.View all copies of this ISBN edition:
Updated and revised to reveal the newest strategies hackers are using to breach security systems and the latest security technologies, a much debated handbook encompasses every facet of Internet protection. Original. (Intermediate).
"synopsis" may belong to another edition of this title.
This book is written for system administrators who need to know how to keep their systems secure from unauthorized use. The anonymous author takes a hacker's view of various systems, focusing on how the system can be cracked and how you can secure the vulnerable areas.
The book makes it clear from the outset that you cannot rely on commercial software for security. Some of it is flawed, and even the best of it has to be used correctly to provide even the most basic security measures. The author scrutinizes such operating systems as Microsoft Windows, Unix, Novell, and Macintosh. He details many of the tools crackers use to attack the system, including several that have legitimate uses for system administration. Rather than merely cataloging areas of risk and showing how various flaws can be exploited, the author makes every effort to show how security holes can be avoided and remedied. Maximum Security tells you which software to avoid and then details which security tools are invaluable, providing the URLs necessary to acquire them. An enclosed CD-ROM provides links to many of the tools and resources discussed in the book. The CD-ROM also leads you to several online documents where you can learn more about Internet security in general and specifics for securing your own site. --Elizabeth LewisFrom the Publisher:
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their networkand work toward a solution to those problems. - Explores the most commonly used hacking techniques so users can safeguard their system
- Covers all computing platforms
- Includes step-by-step lists and discussions of the vulnerabilities inherent in each operating system on the market
"About this title" may belong to another edition of this title.
Book Description SAMS PUBLISHING, 1998. Paperback. Condition: New. 2nd. Seller Inventory # DADAX0672313413
Book Description Sams, 1998. Condition: New. book. Seller Inventory # M0672313413