WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/1018917

Hack attacks denied a complete guide to network lockdown for UNIX, Windows, and Linux

If you've read John Chirillo's provocative work, Hack Attacks Revealed, you're well on your way to understanding how hackers view internet working technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box® tools that hackers use to detect and penetrate network vulnerabilities.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "Arms you with the necessary security steps from the system to the daemon, concluding with an effective security policy. Contains over 170 new countermeasures, patching the top 75 hack attacks for Unix and Windows, cleanup and prevention of malicious code, and a full suite single license version of TigerSurf 2.0 security software."
  • "Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more."
  • "If you've read John Chirillo's provocative work, Hack Attacks Revealed, you're well on your way to understanding how hackers view internet working technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box® tools that hackers use to detect and penetrate network vulnerabilities."@en

http://schema.org/genre

  • "vejledninger"
  • "Electronic resource"
  • "Electronic books"@en

http://schema.org/name

  • "Hack attacks denied a complete guide to network lockdown for UNIX, Windows, and Linux"
  • "Hack attacks denied a complete guide to network lockdown for UNIX, Windows, and Linux"@en
  • "Hack attacks denied a complete guide to network lockdown"@en
  • "Hack Attacks Denied A Complete Guide to Network Lockdown"
  • "Hack attacks denied : a complete guide to network lockdown"
  • "Hack attacks denied : a complete guide to network lockdown"@en
  • "Hack attacks denied : complete guide to network lock-down"
  • "Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux"