03263nam a2200397Ii 4500991003254179707536m d cr cn|||||||||070806s2002 enka s 001 0 eng d97819289947011928994709b13656090-39ule_inst101100:101134Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.822Hack proofing your network[electronic resource] /[contributors] David R. Mirza Ahmad ... [et al.] ; technical editor, Ryan Russell.2nd ed.Rockland, Mass. :[Great Britain] :Syngress,c2002.xxxiv, 787 p. :ill. ;24 cm.Previous ed.: 2000.Includes index.A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials A great addition to the bestselling "Hack Proofing..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer networksSecurity measures.Electronic books.localAhmad, David R. Mirza.authorhttp://id.loc.gov/vocabulary/relators/aut739068Russell, Ryan,1969-Original19289947099781928994701(OCoLC)48468640Referexhttp://www.sciencedirect.com/science/book/9781928994701An electronic book accessible through the World Wide Web; click for information.b1365609024-02-2224-01-08991003254179707536C0TEFHack proofing your network1464015UNISALENTOle02924-01-08mm -engenk00