Maximum Security

Front Cover
Sams Publishing, 2003 - Computers - 945 pages
3 Reviews

Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

  

What people are saying - Write a review

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

User Review  - Not Available - Book Verdict

Network administrators need to read this book closely because a lot of aspiring hackers will be reading it closely and will be looking around for somewhere to practice their new skills, e.g., your lan ... Read full review

User Review - Flag as inappropriate

avinash books

Contents

Hacking 101
95
A Defenders Toolkit
193
Weapons of Mass Destruction
295
Architecture Platforms and Security
379
Security and Integrated Services
643
References
729
Index
871
Inside Back Cover
947
Back Cover
948
Copyright

Common terms and phrases

Popular passages

Page xxx - ... critic and commentator. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. As an Associate Publisher for Que, I welcome your comments.
Page xxx - As the reader of this book, you are our most important critic and commentator. We value your opinion and want to know what we're doing right, what we could do better, what areas...

About the author (2003)

Anonymous is an experienced computer hacker who specializes in testing security of various networking platforms. He was convicted of a series of financial crimes in the late 1980s and now works as a writer, trainer, and security consultant.

Billy Barron (billy@metronet.com) is an architect and developer of security products for Avatier Corporation. Previously, he worked as the architect of a storage resource management product,as a Java/OO consultant and as a Unix/VMS system administrator. He founded the Java Metroplex User Group (JavaMUG http://www.javamug.org/) and was the first webmaster in the Dallas/Fort Worth area. He has co-authored and tech edited numerous books including Maximum Security, Web Programming Unleashed, Tricks of the Internet Gurus, Maximum Java 1.1, Web Commerce Unleashed, Creating Web Applets with Java, and Internet Unleashed.

Greg Shipley is CTO for Neohapsis, an information security consultancy. He is a contributing editor with Network Computing magazine.

Jonathan Feldman is a contributing editor with Network Computing magazine, where he writes a column and frequently contributes technical workshops.,/P>

Robert Blader works at the Naval Surface Warfare Center, where he performs intrusion detection, security training, and network forensics. He has contributed to SANS GIAC courses and SysAdmin magazine.

Chad Cook has worked for ten years in security, with emphasis on secure product architecture, network and operating system security, and new security technologies.

David Harley maintains a number of virus and security related information resources and writes regularly for Virus Bulletin.

Joe Jenkins is a system administrator/security consultant with NoWalls, Inc. and writes for magazines such as SecurityFocus.

L.J. Locher is a network adminstrator, programmer, and security consultant who has written articles for Windows 2000 Magazine.

Toby Miller is a security engineer for Advanced Systems Development and is the author of several papers published for SecurityFocus and the SANS Institute.

Brooke Paul works as an information technology and security consultant.

Nicholas Raba is a well-known expert on Macintosh security.

Gregory White is Vice President of profession services at SecureLogix, and is a former professor of computer science at the US Air Force Academy.

Bibliographic information