Network Security Hacks
100 Industrial-Strength Tips & Tools
By Andrew Lockhart
Publisher: O'Reilly Media
Released: April 2004
Pages: 320

To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters.

Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today.

This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks.

Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network.

O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer.

Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.

Table of Contents
Product Details
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyNetwork Security Hacks
 
5.0

(based on 3 reviews)

Ratings Distribution

  • 5 Stars

     

    (3)

  • 4 Stars

     

    (0)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 3 customers

Sort by

Displaying reviews 1-3

Back to top

(1 of 1 customers found this review helpful)

 
5.0

Honeyd

By Gateseeker

from Undisclosed

Comments about oreilly Network Security Hacks:

Well i've had the book for 2 week's now and i've had lots of fun with 2 chapter's " #94 - Simulate a Network of Vulnerable Hosts and #95 - Record Honeypot Activity, Waching hacker's sniffing around my multi-server honeypot network think themselves clever and having nothing better to do is so "hehehe" ...

(1 of 1 customers found this review helpful)

 
5.0

A definite addition security/administration references

By ashok

from Undisclosed

Comments about oreilly Network Security Hacks:

I previously read the Linux Server Hacks (which is an excellent book) and following up with this book was an easy. Although some of the hacks overlap with the Linux Server Hacks, they definitely belong to both books. I particularly liked sections on ACL, systrace (hack ##4, #15, #16) and also the fact that an entire chapter was dedicated to logging which is very important in case of an intrusion/attack. Overall, 5/5 to this book.

(2 of 3 customers found this review helpful)

 
5.0

Network Security Hacks Review

By Marcelo Araujo

from Undisclosed

Comments about oreilly Network Security Hacks:

I learning security class, i'm use is book .

Very Good, tis book beatiull

Displaying reviews 1-3

Back to top

 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?