CDN$ 27.71
  • List Price: CDN$ 43.99
  • You Save: CDN$ 16.28 (37%)
Usually ships within 2 to 4 weeks.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans Paperback – Oct 3 2002


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 27.71
CDN$ 26.79 CDN$ 3.45

2014 Books Gift Guide
Yes Please, the eagerly anticipated first book from Amy Poehler, the Golden Globe winning star of Parks and Recreation, is featured in our 2014 Books Gift Guide. More gift ideas


Product Details

  • Paperback: 360 pages
  • Publisher: Wiley; 1 edition (Oct. 3 2002)
  • Language: English
  • ISBN-10: 0764549588
  • ISBN-13: 978-0764549588
  • Product Dimensions: 19 x 2.1 x 23.5 cm
  • Shipping Weight: 558 g
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Bestsellers Rank: #3,079,714 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

Inoculate your network against the viruses, worms, and Trojans of today -and tomorrow

Virus writers are becoming craftier and more numerous every year, resulting in huge losses-in revenue, data, productivity, and reputation-for companies and organizations around the world. Going beyond the partial ?xes of today's off-the-shelf security solutions, this book delivers the hands-on strategies and tactics you need to foil malicious code-and protect the integrity of your network. Drawing on his day-to-day networking experience, security expert Douglas Schweitzer describes the threats-both current and projected-and offers detailed, practical advice for securing BIOS, boot sequences, e-mail, instant messaging, Web servers, and more. It's all you need to lock out viruses-and lock down security for your network.

You'll learn how to:
* Understand the threat virus writers and hackers pose
* Get a handle on various types of malicious code
* Protect BIOS, booting, ?le systems, memory, and other basics
* Secure e-mail, browsers, and ?le sharing
* Eliminate virus threats to instant messaging
* Mobilize staff against the threat of viruses and social engineering
* Strengthen ?rewalls, intrusion detection, and data recovery
* Defend against server-side exploits
* Prepare for cyberterrorism and the viruses of the future

The companion Web site contains multiple links to security software solutions.

About the Author

Douglas Schweitzer, A+, Network+, i-Net+, CCNA, CIW, Brainbench Internet Security Certi?ed, is vice-president at an actuarial consulting ?rm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy.

Inside This Book (Learn More)
First Sentence
WHETHER MODERN DAY MALICIOUS code takes the form of a virus, worm, or Trojan horse program, it poses a real threat to organizational networks, causing damage that is often debilitating. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.3 out of 5 stars
5 star
9
4 star
0
3 star
0
2 star
0
1 star
2
See all 11 customer reviews
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
First, I want to preface this by saying that I have not yet read the book. What makes me wonder about whether I want to read it or not is a glaring error I noticed in an excerpt found on the PC Flank website where the author states:
"While it did not carry a damaging payload, it did prove the concept that cross-platform Java viruses could be written. Strange Brew, however, affects only Java applications, not Java applets (the small Java scripts) that typically run inside a Web browser. Because the Java Virtual Machine has built-in security measures, it does not allow Java applets direct access to the hard disk nor the ability to modify applications. This prevented Strange Brew from reaching other Java code and causing harm.
In January of 1999, the second known Java virus, called Java.BeanHive, was discovered. This virus was designed to infect both Java applets as well as Java applications. Remember, Java applets are small Java programs (written in Java Script) that are often used on Web sites that are downloaded and run by Web browsers while users surf the Internet."
While the author is probably correct about the particular Java viruses he mentioned, he is totally wrong about what Java is. Java != JavaScript. While Java and JS share a similar syntax on the basic language level (along with C++), they are not the same language at all. Java is not a scripting language and it is not JavaScript. They are two completely different languages and APIs.
This makes me wonder what other uncaught mistakes are in the book and just how correct the author's facts, and therefore how correct his conclusions are.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
Douglas Schweitzer follows up with another excellent read and a definite "must have" in any administrator's library, be he a professional or a home user with only one or two
desktops to manage. With the propagation of various worms & trojans on the 'net these days, good references are a necessity. "Securing the Network" stands out above the
crowd to offer clear, concise information and recommendations to protect valuable & sensitive data. The appendices alone contain a veritable treasure trove of information.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
The book covers the topic of personal security with insight and in a manner that should be comprehendible to almost all readers regardless of their technical background. It is well written, and quite complete in its topic coverage. With today's high-speed network connections, and almost inexhaustible supply of malicious intruders; the book is almost a necessity. Certainly, anyone with a DSL, Dish, Cable router, or even an unfiltered email account should obtain their own copy without hesitation.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
This book was a lifesaver! The procedures outlined in this book are extremely accurate, thorough and easy to understand. It is one of the best books out there on this topic
I keep nearby as a great reference and would highly recommend it to anyone who is involved with/concerned about network security.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By Gloria on Dec 8 2002
Format: Paperback
I found this book quite interesting. Unlike other books I'v read, this book explained this subject in an easy to understand and interesting manner. While it can get technical at times, I'd say...give it a shot. It's got some great links to security products that I never knew even existed.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
I am trying desperately to contact... your company to cancel an
order I placed on December 6 and am still awaiting on Dec. 14
could someone please contact me about this order #701-04224993560329 Thanking you in advance....MARY CALVO
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.


Feedback