|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Thomas GreenePublisher: APress Imprint: APress Edition: Softcover reprint of the original 1st ed. Dimensions: Width: 19.10cm , Height: 2.50cm , Length: 22.90cm Weight: 0.847kg ISBN: 9781590593165ISBN 10: 1590593162 Pages: 406 Publication Date: 11 March 2004 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1 Introducing the Dark Side.- 2 Vectors.- 3 Social Engineering.- 4 From Newbie to Power User.- 5 Treasure Hunt.- 6 The Open-Source Escape Hatch.- 7 Trust Nothing, Fear Nothing.- Appendix A Glossary.- Appendix B Procedures, Processes, and Ports.- Procedures.- Notes on NAT.- Notes on Packet Filters.- Windows Processes.- Ports.- Appendix C Online Resources.- Security News.- Resources.- E-mail Lists.ReviewsFrom the reviews: Thomas Greene provides the home and SOHO user, and the work-at-home corporate user, a thorough, realistic assessment of the security and privacy risks they face, to instruct them in making their machines and networks unattractive targets for attack and to limit the damage an intrusion or other security snafu can cause. It is a general security and privacy handbook primarily for Window users, but ... accommodates Linux users with occasional boxed tips and sidebars. (it-expert, Issue no. 48, 2004) Author InformationThomas C. Greene is associate editor of The Register, the leading independent IT news daily, where he has been a senior editor and columnist for 5 years. Tom covers cybercrime, computer and network security, and Washington politics and legislation related to information technology. Tab Content 6Author Website:Countries AvailableAll regions |