Facebook Twitter Pinterest <Einbetten>
  • Alle Preisangaben inkl. USt
Gewöhnlich versandfertig in 1 bis 2 Monaten.
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von MEDIMOPS
Zustand: Gebraucht: Gut
Kommentar: Von Europas Nr.1 für gebrauchte Bücher und Medien. Gelesene Ausgabe in gutem Zustand, kann Gebrauchsspuren aufweisen.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Dieses Bild anzeigen

Network Security Hacks (Englisch) Taschenbuch – 7. Mai 2004

4.0 von 5 Sternen 1 Kundenrezension

Alle 3 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Taschenbuch
"Bitte wiederholen"
EUR 19,78
EUR 19,78 EUR 1,89
6 neu ab EUR 19,78 20 gebraucht ab EUR 1,89

Dieses Buch gibt es in einer neuen Auflage:

click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Rezension

Konzentriert und eingedampft: Netzwerksicherheit Hacks besteht aus 100 ausgewählten und erprobten Erfahrungslösungen in Sicherheitsfragen für Unix- und Windows-Server.

Hack nach Hack wird aufgeführt, erklärt, beschrieben, per Code und Einstellungen aufgezeigt und damit abgehakt. Das setzt natürlich eine Menge Vorwissen voraus. Themen sind Unix/Windows-Host-Sicherheit, Netzwerksicherheit, Protokollierung, Monitoring und Trending, sichere Tunnel, Network-Intrusion-Detection sowie Wiederherstellung und Reaktion auf Vorfälle.

Manche Dinge muss man im Leben selbst lernen. Manche nicht. Die 100 Hacks aus dem Netzwerksicherheitsbuch von Andrew Lockhart gehören zu den Dingen, die man besser beherrschen sollte, bevor man sie benötigt. Netzwerksicherheit Hacks ist ein Buch, das direkt auf das Nervenzentrum eines Systemadministrators wirkt: Es beruhigt. --Wolfgang Treß

Synopsis

To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks.

Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.

Alle Produktbeschreibungen

Kundenrezensionen

4.0 von 5 Sternen
5 Sterne
0
4 Sterne
1
3 Sterne
0
2 Sterne
0
1 Stern
0
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Top-Kundenrezensionen

Format: Taschenbuch
Das Buch bietet 100 "Hacks", also 100 schnelle, einfache Lösungen, die die Sicherheit eines Rechners oder eines Netzwerkes erhöhen können. Es zeigt dazu verschiedene Verfahren, wie den Kernel-Patch für Unixoide, den Einsatz von NIDS und HIDS usw.
Es bietet damit eine Ideensammlung, wie man Clients, Server und Netze sicherer machen kann. Die vorgestellten Verfahren werden jedoch nicht in ihrer Effizienz bewertet oder kritisch diskutiert. Vielmehr wird für alle Verfahren nur eine Installations- und Konfigurationsanweisung gegeben.
Sicherheit ist jedoch nicht einfach nur durch die Installation und Konfiguration von Software getan, sondern Sicherheit muß in ein sinnvolles Gesamtkonzept integriert werden. Genau dieses Gesamtkonzept interessiert die 100 Hacks überhaupt nicht. Hier geht es nur um 100 verschiedene (wenn auch teils sehr ähnliche) Verfahren, Sicherheit zu erzeugen.
Einige der 100 Hacks wirken dann auch eher so, als seien sie eingefügt worden, um die Zahl 100 voll zu bekommen. Andere sind sehr lohnend.
Das Buch erscheint mir empfehlenswert für erfahrene Systemadminstratoren, die ein funktionsfähiges Sicherheitskonzept implementiert haben und auf der Suche nach neuen, zusätzlichen Verfahren sind und diese im Rahmen ihres jeweiligen Konzeptes kritisch beurteilen können.
Kommentar 7 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.0 von 5 Sternen 10 Rezensionen
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A great collection of ideas for network security 27. Mai 2012
Von Stephanie Sullivan - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
This is a real go-to book for network security. The problems I usually need to solve for network security issues are not unusual. They are the kinds of things that someone has addressed before. This book make a nice go-to place to find many solutions and often the ones I need. The explanations of each hack is illuminating and provides the context needed to adapt them to my specific purpose. Like other books in the oreilly "hacks" series it's usually got what you need when you need something quick for a common problem.
20 von 30 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen May be right for Unix, but Windows Users beware 12. Februar 2005
Von Tom - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
First, let me make clear right off the bat, I'm leaving this review as someone who purchased this book expecting information on Windows Networks and was disappointed. A large part of why this book was a bad experience for me is that, when a book bills itself as covering both Unix and Windows, I assume it gives equal coverage to both.

If you are a Unix admin this book might very well be just what you need.

That said, of its 300 pages, roughly 35 of them are devoted to Windows. In those 35 pages the author pretty clearly conveys his distaste for Windows even going so far as to misrepresent certain areas of the Windows World (someone should tell the author that Windows does have a fairly powerful scripting engine). Of the Windows tips that are provided, many of them are dedicated to making Windows work with Unix in a mixed environment.

Even without the coverage, it wouldn't take much to figure out the author's bias. The book is full of quotes such as "I know we're used to a robust, powerful scripting function in Unix but Windows doesn't have this so we have to..."

I honestly could have forgiven most of the above if the hacks had been well marked so that I could tell which were Windows related and which were Unix related. That way I would have, at very least, had a visual way to skim the book and realize how lopsided the coverage was so that I could have been saved from purchasing it.

If you're interested in Windows Security advice, I'd suggest picking up Hardening Windows by Roberta Bragg. It's a much better fit.
2 von 2 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Try rummaging thru the hacks 23. Mai 2004
Von W Boudville - Veröffentlicht auf Amazon.com
Format: Taschenbuch
Lockhart has assembled a fascinating collection of 100 hacks to protect your computers against a network intrusion. He covers linux/unix systems and also Microsoft machines. An entire chapter, containing 10 hacks, is devoted to the latter. Most of the other 90 hacks can be applied to both systems, though the example implementations are usually given under linux/unix.
Perusing the list of hacks may cause different readers to be attracted to different hacks. Here, I briefly summarise a few that caught my eye. Consider "Block OS fingerprinting". In an earlier, more innocent age, someone connecting to a telnet, sendmail or ftp daemon would cause it to reply with the machine's operating system label and the version of that daemon. Yes, really! In fact, this is still largely true, by default, on most unixes. Well, nowadays, a sysadmin can stop those daemons doing this. But a cracker can then do other probes. If you are running OpenBSD, you can use pf to block those.
Logically continuing this train of thought, what if you wanted to actively mislead the cracker by mimicking another operating system? This is the honeypot hack. The honeyd daemon lets you masquerade as several types of systems. Pretty crafty, eh? The next hack would then be to record all the cracker's activity on your honeypot via the open source Sebek, which is freely available for linux and Solaris.
Granted, you might be interested in other hacks. But hopefully the above gives you some idea of the book's utility. And a lot of hacks refer to other closely related hacks, in the manner shown above.
24 von 25 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen A handy guide when trying unfamiliar tools or techniques 1. Juli 2004
Von Richard Bejtlich - Veröffentlicht auf Amazon.com
Format: Taschenbuch
"Network Security Hacks" (NSH) has something for nearly everyone, although it focuses squarely on Linux, BSD, and Windows, in that order of preference. Administrators for commercial UNIX variants (Solaris, AIX, HP-UX, etc.) should be able to apply much of the book's advice to their environments, but they are not the target audience. NSH is written for admins needing quick-start guides for common security tools, and in this respect it delivers.
I found NSH to be most rewarding when it avoided discussing the same topics everyone else has covered. Lesser known tools like authpf, ftester, sniffdet, SFS, rpcapd, and Sguil caught my interest (especially as I write Sguil installation docs). Even some ways to use familiar tools were helpful, like the -f (fork) and -N (no command) switches for SSH forwarding. In some cases it made sense to mention well-worn topics like BIND or MySQL, with an eye towards quickly augmenting the security of those servers.
Elsewhere I questioned the need to cover certain tools. With the number of Snort titles approaching double digits, and O'Reilly's own Snort books in the wings, was it really necessary to devote several hacks to Snort? In the same respect, I felt mention of Nmap, Nessus, swatch, and ACID was not needed, nor was advice on implementing certain Windows security features.
In some cases the descriptions were too brief to really explain the technologies at hand. For example, the "Secure Tunnels" chapter discusses a very specific IPSec scenario (wireless client to gateway) without informing the reader of the other sorts of tunnels that are possible. I also questioned some of the content, like p. 47's statement that Windows lacks "robust built-in scripting." Brian Knittel's "Windows XP Under the Hood" would quickly change the author's mind. Also, the anomaly detection preprocessor SPADE is described, even though the last version (Spade-030125.1.tgz, released Jan 03) is only available on a Polish student's Web server and no longer cleanly integrates with Snort past version 2.0.5, released in Nov 03.
Despite these comments, I still found NSH a great addition to my security bookshelf. I found the coverage of Windows more than adequate, given that true security innovation in the public sphere is being done in the open source world and not in Redmond's labs. The writing tends to be clear and the descriptions concise. I guarantee you will find a handful of hacks which pique your curiosity and ultimately help secure your enterprise.
5 von 6 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Excellent material, but heavily weighted towards Unix... 31. Mai 2004
Von Thomas Duff - Veröffentlicht auf Amazon.com
Format: Taschenbuch
If you're at all responsible for or mindful of the security aspects of your network, here's a book you'll enjoy... Network Security Hacks by Andrew Lockhart (O'Reilly). As with all the Hacks titles, this book contains 100 various tips and ideas on how to improve your network security through the use of various software packages or procedures you can implement. The Hacks are grouped into the following chapters:
Unix Host Security; Windows Host Security; Network Security; Logging; Monitoring and Trending; Secure Tunnels; Network Intrusion Detection; Recovery And Response.
This isn't a primer on all you need to know about system security, nor is it meant to be. Network Security Hacks is most helpful for the system or network administrator who understands security but is always looking for various ways to enhance their level of security or ease the administration processes. For instance, in the Monitoring and Trending chapter, you are introduced to a number of free tools you can download that will verify your services, graph your bandwidth trends, monitor real-time network stats, and audit the traffic on your network. While not every hack will appeal or apply to you, you will find plenty of gems that will give you a real and quick payback.
The only "gripe" I have about the book is that it is heavily weighted towards the Unix environment. The Windows chapter is pretty small, and even some of the Windows hacks involve allowing you to work with the data like you can with Unix. So, if you're looking strictly for Windows security tips, you will probably find less satisfaction than you might if you were a hard-core Unix admin. Even so, there is material there that will interest you, such as how to use Snort to set up an intrusion detection system or how to use built-in features of Windows to create your own firewall.
Very good book, and worthy to hold a spot on your bookshelf...
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.