"synopsis" may belong to another edition of this title.
Escamilla begins by exploring intrusion prevention systems--firewalls, user authentication routines, and access controls--and telling how to properly set up such systems. He then describes mechanisms that identify and minimize damage caused by electronic break-ins once they occur. The author covers both system-level and network-level intrusion-detection systems, describing tools that attempt to catch not only outsiders who have broken in, but also legitimate system users who are up to no good.
Escamilla details several anti-intruder tools, including packet sniffers and vulnerability scanners. He describes a lot of Unix hacks and tells what you can do to prevent them from taking place on your systems. Other chapters focus on intrusions in Windows NT environments and what to do when your system is under attack. Escamilla closes with references to other sources. --David Wall
"About this title" may belong to another edition of this title.
Shipping:
US$ 5.09
Within U.S.A.
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 1.3. Seller Inventory # Q-0471290009