Securing the Network from Malicious Code

Securing the Network from Malicious Code : A Complete Guide to Defending Against Viruses, Worms, and Trojans

4 (1 rating by Goodreads)
By (author) 

List price: US$40.00

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

This book covers procedures and practices for everything from social engineering to effectively configuring an intrusion detection system. Author provides the benefit of his day-to-day practices as a security expert. Companion Website features several non-shareware products for effectively defending against malicious code.
show more

Product details

  • Paperback | 360 pages
  • 184 x 232 x 22mm | 557.92g
  • Hungry Minds Inc,U.S.
  • Foster City, United States
  • English
  • w. figs.
  • 0764549588
  • 9780764549588

Back cover copy

Inoculate your network against the viruses, worms, and Trojans of today -and tomorrow
Virus writers are becoming craftier and more numerous every year, resulting in huge losses-in revenue, data, productivity, and reputation-for companies and organizations around the world. Going beyond the partial ?xes of today's off-the-shelf security solutions, this book delivers the hands-on strategies and tactics you need to foil malicious code-and protect the integrity of your network. Drawing on his day-to-day networking experience, security expert Douglas Schweitzer describes the threats-both current and projected-and offers detailed, practical advice for securing BIOS, boot sequences, e-mail, instant messaging, Web servers, and more. It's all you need to lock out viruses-and lock down security for your network.
You'll learn how to:
* Understand the threat virus writers and hackers pose
* Get a handle on various types of malicious code
* Protect BIOS, booting, ?le systems, memory, and other basics
* Secure e-mail, browsers, and ?le sharing
* Eliminate virus threats to instant messaging
* Mobilize staff against the threat of viruses and social engineering
* Strengthen ?rewalls, intrusion detection, and data recovery
* Defend against server-side exploits
* Prepare for cyberterrorism and the viruses of the future
The companion Web site contains multiple links to security software solutions.
show more

Table of contents

Acknowledgments. Introduction. Part I: Threat Analysis. Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses. Chapter 2: Virus Writers and Hackers: Architects of Digital Disease. Chapter 3: Other Digital Threats to Your Organization. Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code. Part II: Applied Tactics for Malicious Code Defense. Chapter 5: Fundamentals Needed for Digital Security. Chapter 6: Networking and Internet Essentials. Chapter 7: Internet Relay Chat (IRC), I--Seek--You (ICQ), Web Page Chat, and Instant Messaging. Chapter 8: Defending Your Company's Network Using Human Resources. Chapter 9: Hardware and Software Protective Measures. Chapter 10: Server--Side Exploits. Part III: Looking Ahead. Chapter 11: Cyberterrorism and Hacktivism--New Millennium, New Threats. Chapter 12: Cyberforensics and the Future of Virus Warfare. Appendix A: What's on the Web Site. Appendix B: Cybercrime before Congress. Appendix C: It's Not Just Fun and "War Games"--Juveniles and Computer Crime. Appendix D: National Infrastructure Protection Center Statement on Cybersecurity Appendix E: National Infrastructure Protection Center Statement on Cybercrime. Appendix F: Glossary--Worm Words and Virus Vocabulary. Index.
show more

About Douglas Schweitzer

Douglas Schweitzer, A+, Network+, i--Net+, CCNA, CIW, Brainbench Internet Security CertiTed, is vice--president at an actuarial consulting Trm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy.
show more

Rating details

1 ratings
4 out of 5 stars
5 0% (0)
4 100% (1)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X