Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Maximum Security: A Hacker's Guide toProtecting Your Internet Site andNetwork

Rating
-
Sold
-
Pages
670
Grade
A+
Uploaded on
25-01-2023
Written in
2022/2023

Maximum Security: A Hacker's Guide toProtecting Your Internet Site andNetwork

Institution
Course

Content preview

Maximum Security: A Hacker's Guide to
Protecting Your Internet Site and
Network
Table of Contents:
• Introduction

I Setting the Stage
• Chapter 1 - Why Did I Write This Book?

• Chapter 2 - How This Book Will Help You

• Chapter 3 - Hackers and Crackers

• Chapter 4 - Just Who Can Be Hacked, Anyway?

II Understanding the Terrain
• Chapter 5 - Is Security a Futile Endeavor?

• Chapter 6 - A Brief Primer on TCP/IP

• Chapter 7 - Birth of a Network: The Internet

• Chapter 8 - Internet Warfare

III Tools
• Chapter 9 - Scanners

• Chapter 10 - Password Crackers

• Chapter 11 - Trojans

• Chapter 12 - Sniffers

• Chapter 13 - Techniques to Hide One's Identity

• Chapter 14 - Destructive Devices

IV Platforms and Security
• Chapter 15 - The Hole

• Chapter 16 - Microsoft

• Chapter 17 - UNIX: The Big Kahuna

, • Chapter 18 - Novell

• Chapter 19 - VAX/VMS

• Chapter 20 - Macintosh

• Chapter 21 - Plan 9 from Bell Labs

V Beginning at Ground Zero
• Chapter 22 - Who or What Is Root?

• Chapter 23 - An Introduction to Breaching a Server Internally

• Chapter 24 - Security Concepts

VI The Remote Attack
• Chapter 25 - The Remote Attack

• Chapter 26 - Levels of Attack

• Chapter 27 - Firewalls

• Chapter 28 - Spoofing Attacks

• Chapter 29 - Telnet-Based Attacks

• Chapter 30 - Language, Extensions, and Security

VII The Law
• Chapter 31 - Reality Bytes: Computer Security and the Law

VIII Appendixes
• Appendix A - How to Get More Information

• Appendix B - Security Consultants

• Appendix C - A Hidden Message About the Internet

• Appendix D - What's on the CD-ROM




© Copyright, Angel722 Computer Publishing. All rights reserved.

, Maximum Security:
A Hacker's Guide to Protecting Your
Internet Site and Network
Dedication
This book is dedicated to Michelle, whose presence has rendered me a prince among
men.

Acknowledgments
My acknowledgments are brief. First, I would like to acknowledge the folks at Sams,
particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob
Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible
mess. They are an awesome editing team and their expertise is truly extraordinary.
Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and Stacie
Latreille. These individuals offered critical support, without which this book could not
have been written.
Also, I would like to recognize the significant contribution made by John David Sale, a
network security specialist located in Van Nuys, California. His input was invaluable. A
similar thanks is also extended to Peter Benson, an Internet and EDI Consultant in Santa
Monica, California (who, incidentally, is the current chairman of ASC X12E). Peter's
patience was (and is) difficult to fathom. Moreover, I forward a special acknowledgment
to David Pennells and his merry band of programmers. Those cats run the most robust
and reliable wire in the southwestern United States.

About the Author
The author describes himself as a "UNIX propeller head" and is a dedicated advocate of
the Perl programming language, Linux, and FreeBSD.
After spending four years as a system administrator for two California health-care firms,
the author started his own security-consulting business. Currently, he specializes in
testing the security of various networking platforms (breaking into computer networks
and subsequently revealing what holes lead to the unauthorized entry) including but not
limited to Novell NetWare, Microsoft Windows NT, SunOS, Solaris, Linux, and
Microsoft Windows 95. His most recent assignment was to secure a wide area network
that spans from Los Angeles to Montreal.
The author now lives quietly in southern California with a Sun SPARCStation, an IBM
RS/6000, two Pentiums, a Macintosh, various remnants of a MicroVAX, and his wife.

, In the late 1980s, the author was convicted of a series of financial crimes after developing
a technique to circumvent bank security in Automatic Teller Machine systems. He
therefore prefers to remain anonymous.

Tell Us What You Think!
As a reader, you are the most important critic and commentator of our books. We value
your opinion and want to know what we're doing right, what we could do better, what
areas you'd like to see us publish in, and any other words of wisdom you're willing to
pass our way. You can help us make strong books that meet your needs and give you the
computer guidance you require.
Do you have access to the World Wide Web? Then check out our site at
http://www.mcp.com.

NOTE: If you have a technical question about this book, call the technical support line at
317-581-3833 or send e-mail to .


As the team leader of the group that created this book, I welcome your comments. You
can fax, e-mail, or write me directly to let me know what you did or didn't like about this
book--as well as what we can do to make our books stronger. Here's the information:
FAX: 317-581-4669
E-mail:
Mark Taber


Mail:
Mark Taber
Comments Department
Sams Publishing
201 W. 103rd Street
Indianapolis, IN 46290

Introduction
I want to write a few words about this book and how it should be used. This book is not
strictly an instructional, or "How To" book. Its purpose is to get you started on a solid
education in Internet security. As such, it is probably constructed differently from any
computer book you have ever read.
Although this book cannot teach you everything you need to know, the references
contained within this book can. Therefore, if you know very little about Internet security,
you will want to maximize the value of this book by adhering to the following procedure:

Written for

Course

Document information

Uploaded on
January 25, 2023
Number of pages
670
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
maggieobita George Washington University - Virginia Campus
Follow You need to be logged in order to follow users or courses
Sold
168
Member since
5 year
Number of followers
156
Documents
5393
Last sold
2 months ago
nursing psychology

Be guaranteed to find every test,testbanks,finals,assignments for the whole course at a good rate and meant for good studies.

3.2

28 reviews

5
8
4
6
3
3
2
5
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions