Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows, and Linux Paperback – Sep 9 2002


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 44.96 CDN$ 3.32

Best Canadian Books of 2014
Stone Mattress is our #1 Canadian pick for 2014. See all

Customers Who Bought This Item Also Bought



Product Details

  • Paperback: 704 pages
  • Publisher: Wiley; 2 edition (Sept. 9 2002)
  • Language: English
  • ISBN-10: 0471232831
  • ISBN-13: 978-0471232834
  • Product Dimensions: 19.4 x 4 x 23.6 cm
  • Shipping Weight: 1.3 Kg
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: #778,817 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

John Chirillo is back and ready to help you outsmart the next generation of intruders!

Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.

This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)

Bonus CD!

To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.

About the Author

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Inside This Book (Learn More)
First Sentence
Hack Attacks Revealed, Second Edition, the predecessor to this book, defined and described computer ports and their services, and explained what makes some of them potentially vulnerable. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Most helpful customer reviews

By mcsei2k on March 5 2003
Format: Paperback
As a companion with his other title, Hack Attacks Revealed, John Chirillo gives us another great book on keeping our networks away from the prying eyes and stubby fingers of the those out there that don't need to be inside our networks, white or black hatters. The content is very well-structured, all concepts are supported by numerous examples so even if one doesn't understand the subject in it's depth he or she can find an answer to a specific real-world question. They say sequels are never better than the original. This may be somewhat true for this book. This is a VERY GOOD book. It's just that it's not as good as the first volume. It is a lot better...it is so much more geared for both sides of the IT spectrum...those of us up to our necks at the NOCs, and for the SOHO admin who needs juicy morsels for his knowledge palate... I have already started to implement Chirillo's countermeasures from this book, on top of the ones we are forced to use in a government system. Kudos to the author!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 1 review
7 of 8 people found the following review helpful
Chirillo Strikes Again! March 5 2003
By mcsei2k - Published on Amazon.com
Format: Paperback
As a companion with his other title, Hack Attacks Revealed, John Chirillo gives us another great book on keeping our networks away from the prying eyes and stubby fingers of the those out there that don't need to be inside our networks, white or black hatters. The content is very well-structured, all concepts are supported by numerous examples so even if one doesn't understand the subject in it's depth he or she can find an answer to a specific real-world question. They say sequels are never better than the original. This may be somewhat true for this book. This is a VERY GOOD book. It's just that it's not as good as the first volume. It is a lot better...it is so much more geared for both sides of the IT spectrum...those of us up to our necks at the NOCs, and for the SOHO admin who needs juicy morsels for his knowledge palate... I have already started to implement Chirillo's countermeasures from this book, on top of the ones we are forced to use in a government system. Kudos to the author!


Feedback