CARVIEW |
By?Andrew Lockhart
First Edition
April 2004
Pages: 316
Series: Hacks
ISBN 10: 0-596-00643-8 |
ISBN 13:9780596006433
(Average of 4 Customer Reviews)
This book has been updated—the edition you're requesting is OUT OF PRINT. Please visit the catalog page of the latest edition.
The latest edition is also available on Safari Books Online.
This information-packed book provides more than 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks demonstrates effective methods for defending your servers and networks from a variety of devious and subtle attacks.
Full Description
Cover | Table of Contents | Index | Sample Hacks | Colophon
Featured customer reviews
Honeyd, May 09 2005





Well i've had the book for 2 week's now and i've had lots of fun with 2 chapter's " #94 - Simulate a Network of Vulnerable Hosts and #95 - Record Honeypot Activity, Waching hacker's sniffing around my multi-server honeypot network think themselves clever and having nothing better to do is so "hehehe" ...
Excellent Book, September 08 2004





This book took me a long time to read, but for a good reason, I kept implementing
the various hacks in the book on a server I had started setting up.
The book is mostly Unix related, but there is some Windows related ‘hacks’ as well.
I think the Windows coverage was lacking a bit though. For Unix, it talks about
Linux, the BSD’s and a bit on Mac OS X and Solaris. Most of the topics are
general enough to apply to any Unix based Operating System, but some are specific
to an operating system.
One of the great things about the Hacks series of books by O’Reilly is that the
information is presented in nice small chunks that you can read in a few minutes
if you have some spare time.
The hacks are all ‘hyperlinked’ to each other, if a hack mentions something that
relates to another hack, it is highlighted in blue and the hack that it
references is listed. I did find a few places where this wasn’t done
(#84 Real-Time Monitoring, first mentions Barnyard but doesn’t provide any
information on it or mention that it is one of the later hacks).
Lots of the hacks in the book could be found by doing some reading on the
internet, but finding such a variety of topics all in one place, with enough
information to get you started is really nice. Even though I consider myself to
be fairly security conscious, I still found quite a few things in this book that
I hadn’t thought of, or plain didn’t realize were possible or even existed. I
would recommend this book to anyone that is interested in security or anyone
responsible for maintaining a server (whether or not it is on the internet).
A definite addition security/administration references, August 18 2004





I previously read the Linux Server Hacks (which is an excellent book) and following up with this book was an easy. Although some of the hacks overlap with the Linux Server Hacks, they definitely belong to both books. I particularly liked sections on ACL, systrace (hack ##4, #15, #16) and also the fact that an entire chapter was dedicated to logging which is very important in case of an intrusion/attack. Overall, 5/5 to this book.
Network Security Hacks Review, March 25 2004





<center> I learning security class, i'm use is book . </center>
Very Good, tis book beatiull
Media reviews
"Unlike many others, Lockhart's book is comprehensive; covering tips for UNIX, Linux and Microsoft Windows systems. Because no system or network is impenetrable, meaning every system can be compromised, Lockhart offers a critical approach to minimizing the impact of a security breach. From hardening a server, applied encryption, trending and logging to intrusion detection and incident response, Andrew Lockhart's Network Security Hacks is an excellent resource."
--Alex Weeks, "Linux Journal," January 2005
"This isn't a sit-down-and-read-the-theory kind of book. It also assumes that you, as the network admin or engineer, have a pretty good understanding of UNIX and Windows, as well as network infrastructure. It this fits you, then you'll find Network Security Hacks refreshing. Chapter One starts with UNIX security and from there all the way to the index, it's just one hack after another...If you run a multi-platform environment (and what IT manager doesn't these days?), you'll find this to be handy volume to apply against your network."
--Jim Huddle, KickstartNews.com, October 2004
https://www.kickstartnews.com/reviews/books/network_security_hacks.html
"I was pleasantly surprised to see that the author took time to present some lesser-known but very useful tips...This is a great complement to the other titles in O'Reillys Hacks series."
--Computerworld, August 2004
About O'Reilly | Contact | Jobs | Press Room | How to Advertise | Privacy Policy
|
© 2008, O'Reilly Media, Inc. | (707) 827-7000 / (800) 998-9938
All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.