Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans [Paperback]

Douglas Schweitzer
4.3 out of 5 stars  See all reviews (11 customer reviews)
List Price: CDN$ 43.99
Price: CDN$ 27.71 & FREE Shipping. Details
You Save: CDN$ 16.28 (37%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 1 to 4 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.
Join Amazon Student in Canada


Book Description

Oct. 3 2002
Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system.
* Author provides the benefit of his day-to-day practices as a security expert.
* Companion Website features several non-shareware products for effectively defending against malicious code.

Product Details


Product Description

From the Back Cover

Inoculate your network against the viruses, worms, and Trojans of today -and tomorrow

Virus writers are becoming craftier and more numerous every year, resulting in huge losses-in revenue, data, productivity, and reputation-for companies and organizations around the world. Going beyond the partial ?xes of today's off-the-shelf security solutions, this book delivers the hands-on strategies and tactics you need to foil malicious code-and protect the integrity of your network. Drawing on his day-to-day networking experience, security expert Douglas Schweitzer describes the threats-both current and projected-and offers detailed, practical advice for securing BIOS, boot sequences, e-mail, instant messaging, Web servers, and more. It's all you need to lock out viruses-and lock down security for your network.

You'll learn how to:
* Understand the threat virus writers and hackers pose
* Get a handle on various types of malicious code
* Protect BIOS, booting, ?le systems, memory, and other basics
* Secure e-mail, browsers, and ?le sharing
* Eliminate virus threats to instant messaging
* Mobilize staff against the threat of viruses and social engineering
* Strengthen ?rewalls, intrusion detection, and data recovery
* Defend against server-side exploits
* Prepare for cyberterrorism and the viruses of the future

The companion Web site contains multiple links to security software solutions.

About the Author

Douglas Schweitzer, A+, Network+, i-Net+, CCNA, CIW, Brainbench Internet Security Certi?ed, is vice-president at an actuarial consulting ?rm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy.

Inside This Book (Learn More)
First Sentence
WHETHER MODERN DAY MALICIOUS code takes the form of a virus, worm, or Trojan horse program, it poses a real threat to organizational networks, causing damage that is often debilitating. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

4 star
0
3 star
0
2 star
0
4.3 out of 5 stars
4.3 out of 5 stars
Most helpful customer reviews
1.0 out of 5 stars Errors in the book make me wonder? Dec 4 2002
Format:Paperback
First, I want to preface this by saying that I have not yet read the book. What makes me wonder about whether I want to read it or not is a glaring error I noticed in an excerpt found on the PC Flank website where the author states:
"While it did not carry a damaging payload, it did prove the concept that cross-platform Java viruses could be written. Strange Brew, however, affects only Java applications, not Java applets (the small Java scripts) that typically run inside a Web browser. Because the Java Virtual Machine has built-in security measures, it does not allow Java applets direct access to the hard disk nor the ability to modify applications. This prevented Strange Brew from reaching other Java code and causing harm.
In January of 1999, the second known Java virus, called Java.BeanHive, was discovered. This virus was designed to infect both Java applets as well as Java applications. Remember, Java applets are small Java programs (written in Java Script) that are often used on Web sites that are downloaded and run by Web browsers while users surf the Internet."
While the author is probably correct about the particular Java viruses he mentioned, he is totally wrong about what Java is. Java != JavaScript. While Java and JS share a similar syntax on the basic language level (along with C++), they are not the same language at all. Java is not a scripting language and it is not JavaScript. They are two completely different languages and APIs.
This makes me wonder what other uncaught mistakes are in the book and just how correct the author's facts, and therefore how correct his conclusions are.
Was this review helpful to you?
5.0 out of 5 stars A "Must Have" for Anyone Serious about Security Oct. 20 2002
Format:Paperback
Douglas Schweitzer follows up with another excellent read and a definite "must have" in any administrator's library, be he a professional or a home user with only one or two
desktops to manage. With the propagation of various worms & trojans on the 'net these days, good references are a necessity. "Securing the Network" stands out above the
crowd to offer clear, concise information and recommendations to protect valuable & sensitive data. The appendices alone contain a veritable treasure trove of information.
Was this review helpful to you?
Format:Paperback
The book covers the topic of personal security with insight and in a manner that should be comprehendible to almost all readers regardless of their technical background. It is well written, and quite complete in its topic coverage. With today's high-speed network connections, and almost inexhaustible supply of malicious intruders; the book is almost a necessity. Certainly, anyone with a DSL, Dish, Cable router, or even an unfiltered email account should obtain their own copy without hesitation.
Was this review helpful to you?
5.0 out of 5 stars Network Administrator Dec 6 2002
Format:Paperback
This book was a lifesaver! The procedures outlined in this book are extremely accurate, thorough and easy to understand. It is one of the best books out there on this topic
I keep nearby as a great reference and would highly recommend it to anyone who is involved with/concerned about network security.
Was this review helpful to you?
5.0 out of 5 stars Very Interesting Dec 8 2002
By Gloria
Format:Paperback
I found this book quite interesting. Unlike other books I'v read, this book explained this subject in an easy to understand and interesting manner. While it can get technical at times, I'd say...give it a shot. It's got some great links to security products that I never knew even existed.
Was this review helpful to you?
1.0 out of 5 stars not very happy about your service Dec 14 2004
Format:Paperback
I am trying desperately to contact... your company to cancel an
order I placed on December 6 and am still awaiting on Dec. 14
could someone please contact me about this order #701-04224993560329 Thanking you in advance....MARY CALVO
Was this review helpful to you?
Want to see more reviews on this item?

Look for similar items by category


Feedback