• Complain

Andrew Lockhart - Network Security Hacks

Here you can read online Andrew Lockhart - Network Security Hacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2006, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Network Security Hacks
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2006
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Network Security Hacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Network Security Hacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this roll up your sleeves and get busy security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

Andrew Lockhart: author's other books


Who wrote Network Security Hacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Network Security Hacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Network Security Hacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Network Security Hacks
Andrew Lockhart
Editor
Brian Sawyer

Copyright 2009 O'Reilly Media, Inc.

OReilly Media SPECIAL OFFER Upgrade this ebook with OReilly for more - photo 1

O'Reilly Media

SPECIAL OFFER: Upgrade this ebook with OReilly

for more information on this offer!

Please note that upgrade offers are not available from sample content.

Copyright

Copyright 2007, 2004 O'Reilly Media, Inc. All rights reserved.Printed in the United States of America.

Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.

O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles ( safari.oreilly.com ). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com .

Editor: Brian Sawyer

Production Editor: Philip Dangler

Copyeditor: Rachel Wheeler

Indexer: Ellen Troutman-Zaig

Cover Designer: Karen Montgomery

Interior Designer: David Futato

Illustrators: Robert Romano and Jessamyn Read

Printing History:

April 2004:First Edition.

November 2006:Second Edition.

Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, Network Security Hacks , the image of barbed wire, and related trade dress are trademarks of O'Reilly Media, Inc.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps.

While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws.

ISBN 10: 0-596-52763-2

Credits
About the Author

Andrew Lockhart is originally from South Carolina but currently resides in northern Colorado, where he spends his time trying to learn the black art of auditing disassembled binaries and trying to keep from freezing to death. He holds a BS in computer science from Colorado State University and has done security consulting for small businesses in the area. When hes not writing books, hes a senior security analyst with Network Chemistry, a leading provider of wireless security solutions. Andrew is also a member of the Wireless Vulnerabilities and Exploits projects (http://www.wirelessve.org) editorial board and regularly contributes to their wireless security column at NetworkWorld (http://www.networkworld.com/topics/wireless-security.html). In his free time, he works on Snort-Wireless (http://snort-wireless.org), a project intended to add wireless intrusion detection to the popular open source IDS Snort.

Contributors

The following people contributed hacks, writing, and inspiration to this book:

  • Oktay Altunergil is the founder of The Free Linux CD Project (http://www.freelinuxcd.org) and one of the maintainers of Turk-PHP.com (a Turkish PHP portal). He also works full-time as a Unix system administrator and PHP programmer.

  • Michael D. (Mick) Bauer (http://mick.wiremonkeys.org) writes Linux Journal s Paranoid Penguin security column. By day, he works to keep strangers out of banks computer networks.

  • Schuyler Erle (http://nocat.net) is a Free Software developer and activist. His interests include collaborative cartography, wireless networking, software for social and political change, and the Semantic Web. Schuyler is the lead developer of NoCatAuth, the leading open source wireless captive portal.

  • Bob Fleck (http://www.securesoftware.com) is Director of Security Services at Secure Software. He consults in the fields of secure development and wireless security and is a coauthor of OReillys 802.11 Security book. The results of his more recent investigations into Bluetooth security can be found at http://bluetooth.shmoo.com.

  • Rob Flickenger (http://nocat.net) is a writer and editor for OReillys Hacks series. He currently spends his time hacking on various projects and promoting community wireless networking.

  • Preston Gralla is the author of more than 30 books about computers and the Internet, which have been translated into 15 languages, including Windows XP Hacks (OReilly), Internet Annoyances (OReilly), and Windows XP Power Hound (Pogue Press). He has been writing about technology since the dawn of the PC age, and he has been an editor and columnist for many national newspapers, magazines, and web sites. He was the founding editor of PC Week ; a founding editor, then editor, then editorial director of PC/Computing ; and executive editor for ZDNet/CNet. Preston has written about technology for numerous magazines and newspapers, including PC Magazine , Computerworld , CIO Magazine , Computer Shopper , the Los Angeles Times , USA Today , the Dallas Morning News (where he was a technology columnist), and many others. He has been a columnist for ZDNet/CNet and is currently a columnist for TechTarget.com. His commentaries about technology have been featured on National Public Radios All Things Considered, and he has won the award for the Best Feature in a Computer Publication from the Computer Press Association. Under his editorship, PC/Computing was a finalist in the category of General Excellence for the National Magazine Awards. Preston is also the editor of OReillys WindowsDevCenter.com site. He lives in Cambridge, MA, with his wife and two childrenalthough his daughter has recently fled the nest for college. Between writing books, articles, and columns, he swims, plays tennis, goes to the opera, and contemplates the rams skull hanging on the wall of his office.

  • Michael Lucas (http://www.blackhelicopters.org/~mwlucas/) lives in a haunted house in Detroit, Michigan, with his wife Liz, assorted rodents, and a multitude of fish. He has been a pet wrangler, a librarian, and a security consultant, and he now works as a network engineer and system administrator with the Great Lakes Technologies Group. Michael is the author of Absolute BSD , Absolute OpenBSD , and Cisco Routers for the Desperate (all from No Starch Press), and he is currently preparing a book about NetBSD.

  • Matt Messier (http://www.securesoftware.com) is Director of Engineering at Secure Software and a security authority who has been programming for nearly two decades. In addition to coauthoring the OReilly books

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Network Security Hacks»

Look at similar books to Network Security Hacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Network Security Hacks»

Discussion, reviews of the book Network Security Hacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.