Network Security Hacks und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr


oder
Loggen Sie sich ein, um 1-Click® einzuschalten.
oder
Mit kostenloser Probeteilnahme bei Amazon Prime. Melden Sie sich während des Bestellvorgangs an.
Jetzt eintauschen
und EUR 1,64 Gutschein erhalten
Eintausch
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von Network Security Hacks auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

Network Security Hacks: Tips & Tools for Protecting Your Privacy [Englisch] [Taschenbuch]

Andrew Lockhart
4.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
Preis: EUR 29,00 kostenlose Lieferung. Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Lieferung bis Freitag, 25. Juli: Wählen Sie an der Kasse Morning-Express. Siehe Details.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 16,66  
Taschenbuch EUR 18,51  
Taschenbuch, 10. November 2006 EUR 29,00  

Kurzbeschreibung

10. November 2006 Hacks
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

Hinweise und Aktionen

  • Studienbücher: Ob neu oder gebraucht, alle wichtigen Bücher für Ihr Studium finden Sie im großen Studium Special. Natürlich portofrei.


Wird oft zusammen gekauft

Network Security Hacks: Tips & Tools for Protecting Your Privacy + Linux Server Hacks
Preis für beide: EUR 47,10

Die ausgewählten Artikel zusammen kaufen
  • Linux Server Hacks EUR 18,10

Kunden, die diesen Artikel angesehen haben, haben auch angesehen


Produktinformation

  • Taschenbuch: 478 Seiten
  • Verlag: O'Reilly & Associates; Auflage: 2 (10. November 2006)
  • Sprache: Englisch
  • ISBN-10: 0596527632
  • ISBN-13: 978-0596527631
  • Größe und/oder Gewicht: 2,7 x 15,2 x 22,9 cm
  • Durchschnittliche Kundenbewertung: 4.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 157.484 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Rezension

Konzentriert und eingedampft: Netzwerksicherheit Hacks besteht aus 100 ausgewählten und erprobten Erfahrungslösungen in Sicherheitsfragen für Unix- und Windows-Server.

Hack nach Hack wird aufgeführt, erklärt, beschrieben, per Code und Einstellungen aufgezeigt und damit abgehakt. Das setzt natürlich eine Menge Vorwissen voraus. Themen sind Unix/Windows-Host-Sicherheit, Netzwerksicherheit, Protokollierung, Monitoring und Trending, sichere Tunnel, Network-Intrusion-Detection sowie Wiederherstellung und Reaktion auf Vorfälle.

Manche Dinge muss man im Leben selbst lernen. Manche nicht. Die 100 Hacks aus dem Netzwerksicherheitsbuch von Andrew Lockhart gehören zu den Dingen, die man besser beherrschen sollte, bevor man sie benötigt. Netzwerksicherheit Hacks ist ein Buch, das direkt auf das Nervenzentrum eines Systemadministrators wirkt: Es beruhigt. --Wolfgang Treß -- Dieser Text bezieht sich auf eine andere Ausgabe: Taschenbuch .

Synopsis

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. The new edition of "Network Security Hacks" offers 100 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.


In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

5 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
4.0 von 5 Sternen
4.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
7 von 7 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Schlagworte und Ideen für Netzwerksicherheit 8. März 2005
Von Ein Kunde
Format:Taschenbuch
Das Buch bietet 100 "Hacks", also 100 schnelle, einfache Lösungen, die die Sicherheit eines Rechners oder eines Netzwerkes erhöhen können. Es zeigt dazu verschiedene Verfahren, wie den Kernel-Patch für Unixoide, den Einsatz von NIDS und HIDS usw.
Es bietet damit eine Ideensammlung, wie man Clients, Server und Netze sicherer machen kann. Die vorgestellten Verfahren werden jedoch nicht in ihrer Effizienz bewertet oder kritisch diskutiert. Vielmehr wird für alle Verfahren nur eine Installations- und Konfigurationsanweisung gegeben.
Sicherheit ist jedoch nicht einfach nur durch die Installation und Konfiguration von Software getan, sondern Sicherheit muß in ein sinnvolles Gesamtkonzept integriert werden. Genau dieses Gesamtkonzept interessiert die 100 Hacks überhaupt nicht. Hier geht es nur um 100 verschiedene (wenn auch teils sehr ähnliche) Verfahren, Sicherheit zu erzeugen.
Einige der 100 Hacks wirken dann auch eher so, als seien sie eingefügt worden, um die Zahl 100 voll zu bekommen. Andere sind sehr lohnend.
Das Buch erscheint mir empfehlenswert für erfahrene Systemadminstratoren, die ein funktionsfähiges Sicherheitskonzept implementiert haben und auf der Suche nach neuen, zusätzlichen Verfahren sind und diese im Rahmen ihres jeweiligen Konzeptes kritisch beurteilen können.
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.2 von 5 Sternen  23 Rezensionen
24 von 25 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen A handy guide when trying unfamiliar tools or techniques 1. Juli 2004
Von Richard Bejtlich - Veröffentlicht auf Amazon.com
Format:Taschenbuch
"Network Security Hacks" (NSH) has something for nearly everyone, although it focuses squarely on Linux, BSD, and Windows, in that order of preference. Administrators for commercial UNIX variants (Solaris, AIX, HP-UX, etc.) should be able to apply much of the book's advice to their environments, but they are not the target audience. NSH is written for admins needing quick-start guides for common security tools, and in this respect it delivers.
I found NSH to be most rewarding when it avoided discussing the same topics everyone else has covered. Lesser known tools like authpf, ftester, sniffdet, SFS, rpcapd, and Sguil caught my interest (especially as I write Sguil installation docs). Even some ways to use familiar tools were helpful, like the -f (fork) and -N (no command) switches for SSH forwarding. In some cases it made sense to mention well-worn topics like BIND or MySQL, with an eye towards quickly augmenting the security of those servers.
Elsewhere I questioned the need to cover certain tools. With the number of Snort titles approaching double digits, and O'Reilly's own Snort books in the wings, was it really necessary to devote several hacks to Snort? In the same respect, I felt mention of Nmap, Nessus, swatch, and ACID was not needed, nor was advice on implementing certain Windows security features.
In some cases the descriptions were too brief to really explain the technologies at hand. For example, the "Secure Tunnels" chapter discusses a very specific IPSec scenario (wireless client to gateway) without informing the reader of the other sorts of tunnels that are possible. I also questioned some of the content, like p. 47's statement that Windows lacks "robust built-in scripting." Brian Knittel's "Windows XP Under the Hood" would quickly change the author's mind. Also, the anomaly detection preprocessor SPADE is described, even though the last version (Spade-030125.1.tgz, released Jan 03) is only available on a Polish student's Web server and no longer cleanly integrates with Snort past version 2.0.5, released in Nov 03.
Despite these comments, I still found NSH a great addition to my security bookshelf. I found the coverage of Windows more than adequate, given that true security innovation in the public sphere is being done in the open source world and not in Redmond's labs. The writing tends to be clear and the descriptions concise. I guarantee you will find a handful of hacks which pique your curiosity and ultimately help secure your enterprise.
35 von 39 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Not for the amateur 29. Juli 2004
Von Jack D. Herrington - Veröffentlicht auf Amazon.com
Format:Taschenbuch
It's important to understand who this book is for. It's not for the amateur looking to configure their firewall. The book starts with locking up UNIX filesystems and doesn't turn back the complexity clock as it winds through all the way to advanced topics like Honeypots and various SSH tunneling schemes. I highly recommend this book for network administrators and security professionals looking to make sure they have all of their bases covered. However, for the personal computer user looking to make sure their DSL doesn't get hacked I cannot recommend this book.
14 von 15 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent book on security. 9. September 2004
Von swallbridge - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This book took me a long time to read, but for a good reason, I kept implementing

the various hacks in the book on a server I had started setting up.

The book is mostly Unix related, but there is some Windows related `hacks' as well.

I think the Windows coverage was lacking a bit though. For Unix, it talks about

Linux, the BSD's and a bit on Mac OS X and Solaris. Most of the topics are

general enough to apply to any Unix based Operating System, but some are specific

to an operating system.

One of the great things about the Hacks series of books by O'Reilly is that the

information is presented in nice small chunks that you can read in a few minutes

if you have some spare time.

The hacks are all `hyperlinked' to each other, if a hack mentions something that

relates to another hack, it is highlighted in blue and the hack that it

references is listed. I did find a few places where this wasn't done

(#84 Real-Time Monitoring, first mentions Barnyard but doesn't provide any

information on it or mention that it is one of the later hacks).

Lots of the hacks in the book could be found by doing some reading on the

internet, but finding such a variety of topics all in one place, with enough

information to get you started is really nice. Even though I consider myself to

be fairly security conscious, I still found quite a few things in this book that

I hadn't thought of, or plain didn't realize were possible or even existed. I

would recommend this book to anyone that is interested in security or anyone

responsible for maintaining a server (whether or not it is on the internet).
15 von 17 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Useful Tips, Limited on Windows 1. August 2004
Von Joaquin Menchaca - Veröffentlicht auf Amazon.com
Format:Taschenbuch
Overall, I find this book to be an enjoyable read. I thumb through it time and time again, and come up with some useful hints and tips (not really necessarily hacks though). It's more oriented toward BSD Unix and Linux, but I did find some useful hints for Windows (the current topic of my studies). I really like the plug for ntsyslod (hack 56), which can take binary event logs and route them to syslogd service. Nice. Finally, logs in Windows are now open for business.

I found some material to be trivial, making problems from non-problems, or rather not practical to implement. For example, one hint advises Windows users to encrypt their temp directory (hack 28). However, there are easy workarounds to bypass EFS, and the temp directory is within a user's profile, and thus secured from other users anyhow. So encrypting it is unecessary, and not useful given users can drag a file to a floppy or non-NTFS filesystem to and bypass the encryption.

One hack recommended flush the page file as some important application data might be in there (hack 29). However, this requires delving into the registry, and to implement across all workstations is too taxing. However, there could be ways to automate this through group policy objects and scripts. There's no coverage on how to automate some of these chores, which is not always straightforward in Windows.

One a final note, I wish there was more coverage of Windows. There's could be equivelent coverage of things like time sychronization (hack 44) for Windows as well.

Overall though, I think there are enough useful tips to make this book valuable. I've already wrote my name on this one...
8 von 10 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good simple reference 10. Juni 2004
Von Dr Anton Chuvakin - Veröffentlicht auf Amazon.com
Format:Taschenbuch
When I first got this little book, I was unimpressed by its idea: a seemingly random collection of network security tips, combined under the same cover. However, when I started reading, more and more often I exclaimed "ah, that is how it is done", etc. The book is one cool collection of tips, ranging from mundane (`how to configure iptables on Linux') to fairly esoteric (`how to use MySQL as an authenticating backend for an FTP server'). Always wanted to use `grsecurity' or `systrace', but thought it is too complicated - grab the book and give it a shot. Want to set up a fancy encrypted tunnel between two networks - it covers that too. Admittedly, a lot of advice given in the book can be found on Google, but it is nice to find it in one place. The book covers selected topics in host security, SSH and VPNs, IDS, monitoring and even touches upon forensics. I also liked its multi-platform coverage, with a slight, but unmistakable UNIX/Linux bias.
Overall, it is a great simple book, provided you don't try to find in it something it isn't: a neat collection of simple network security tips. I somewhat disliked that many tips don't go beyond `how to install a tool' and stop short of discussing `how to use it best'.
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004) and contributor to "Know Your Enemy II" by the Honeynet Project (AWL, 2004)). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar