Skip to main content

Hack Attacks Denied: A Complete Guide to Network Lockdown

Hack Attacks Denied: A Complete Guide to Network Lockdown

John Chirillo

ISBN: 978-0-471-19051-6

Apr 2001

512 pages

Select type: E-Book

$35.99

Description

Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.
Acknowledgments.

A Note to the Reader.

Introduction.

SECURING PORTS AND SERVICES.

Common Ports and Services.

Concealed Ports and Services.

Discovery Countermeasures.

Intuitive Intermission: The Other Side.

INTRUSION DEFENSE MECHANISMS.

Safeguarding Against Penetration Attacks.

TIGER TEAM SECRETS.

Locking Down Perimeter Hardware and Server Daemons.

PUTTING IT ALL TOGETHER.

Intuitive Intermission: Final Act: Rebirth.

Security Policies.

Appendix A: SafetyWare.

Appendix B: Template for Security Plan.

Appendix C: What's on the CD.

Glossary.

References.

Index.
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)