Hack Attacks Denied, Second Edition: A CompleteGuide to Network Lockdown for UNIX, Windows, andLinux
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Hack Attacks Denied, Second Edition: A CompleteGuide to Network Lockdown for UNIX, Windows, andLinux

English

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

English

Acknowledgments.

A Note to the Reader.

Introduction.

Phase One: Securing Ports and Services.

Chapter 1: Common Ports and Services.

Chapter 2: Concealed Ports and Services.

Chapter 3: Discovery Countermeasures.

Intuitive Intermission The Other Side.

Phase Two: Intrusion Defense Mechanisms.

Chapter 4: Safeguarding Against Penetration Attacks.

Phase Three: Tiger Team Secrets.

Chapter 5: Locking Down Perimeter Hardware and Service Daemons.

Chapter 6: The Top 75 Hack Attacks.

Phase Four: Putting It All Together.

Intuitive Intermission Final Act: Rebirth.

Chapter 7: Security Policies.

Appendix: A SafetyWare.

Appendix: B Security Plan Template.

Appendix: B What's on the CD.

Glossary.

References.

Index.
loading