This complete reference shows how Internet and network security is implemented and details ways to keep it from being violated. Inadequacies in current security products and set-ups are pointed out and strategies to overcome them are detailed step by step.
"synopsis" may belong to another edition of this title.
Internet Security covers far more material than most other books on the subject, but--inevitably--in less depth. You'll find chapters on daemons, Unix-to-Unix copy (UUCP), audit trails, spoofing and sniffing, SATAN, Kerberos, encryption and PGP, Java, CGI, and viruses. Encompassing such a broad range of material in detail is risky, and this book suffers from several gaps. For example, the subject of electronic commerce goes untouched, with no mention of payment-specific schemes such as CyberCash or protocols such as Secure Electronic Transaction (SET). For those topics that are included, the level of depth varies considerably: Some topics are covered by well-written overviews, others by listing the programs' parameters in excruciating detail, and still others by simplistic tutorials that seem out of place in a technical volume. In addition, there are topics such as encryption, which are scattered across many sections.
You'll also find the full text of RFC 1244, a publicly available document known as the Site Security Handbook. (The only extra value in including it here is that you get it in printed form.) Similarly, the section on building firewalls contains the full manual for the TIS toolkit, a public domain firewall utility that is included (along with its manual) on the bundled CD-ROM.
If you are using the Internet to conduct professional or personal business, you want to know your Internet connection is secure. This book gives you all the information and tools you need to keep the hackers out and the mission-critical information in. It takes you through planning, implementing, and administering a secure Internet connection--from understanding UUCP and auditing to encryption and firewalls to understanding viruses. A comprehensive resource for security and network professionals alike, this book will show you how to use and implement the latest technologies in the most secure fashion, including Java, CGI, and Windows NT.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Wonder Book, Frederick, MD, U.S.A.
Condition: Good. Good condition. With CD! A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. NOT AVAILABLE FOR SHIPMENT OUTSIDE OF THE UNITED STATES. Seller Inventory # V04G-01159
Quantity: 2 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_376937162
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_354755961
Quantity: 1 available