Hack Attacks Denied, Second Edition: A CompleteGuide to Network Lockdown for UNIX, Windows, andLinux
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
More About This Title Hack Attacks Denied, Second Edition: A CompleteGuide to Network Lockdown for UNIX, Windows, andLinux
- English
English
JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.
- English
English
Acknowledgments.
A Note to the Reader.
Introduction.
Phase One: Securing Ports and Services.
Chapter 1: Common Ports and Services.
Chapter 2: Concealed Ports and Services.
Chapter 3: Discovery Countermeasures.
Intuitive Intermission The Other Side.
Phase Two: Intrusion Defense Mechanisms.
Chapter 4: Safeguarding Against Penetration Attacks.
Phase Three: Tiger Team Secrets.
Chapter 5: Locking Down Perimeter Hardware and Service Daemons.
Chapter 6: The Top 75 Hack Attacks.
Phase Four: Putting It All Together.
Intuitive Intermission Final Act: Rebirth.
Chapter 7: Security Policies.
Appendix: A SafetyWare.
Appendix: B Security Plan Template.
Appendix: B What's on the CD.
Glossary.
References.
Index.
A Note to the Reader.
Introduction.
Phase One: Securing Ports and Services.
Chapter 1: Common Ports and Services.
Chapter 2: Concealed Ports and Services.
Chapter 3: Discovery Countermeasures.
Intuitive Intermission The Other Side.
Phase Two: Intrusion Defense Mechanisms.
Chapter 4: Safeguarding Against Penetration Attacks.
Phase Three: Tiger Team Secrets.
Chapter 5: Locking Down Perimeter Hardware and Service Daemons.
Chapter 6: The Top 75 Hack Attacks.
Phase Four: Putting It All Together.
Intuitive Intermission Final Act: Rebirth.
Chapter 7: Security Policies.
Appendix: A SafetyWare.
Appendix: B Security Plan Template.
Appendix: B What's on the CD.
Glossary.
References.
Index.