"Network Security Hacks", Andrew Lockart, 2004, 0-596-00643-8,
%A Andrew Lockart
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%I O'Reilly & Associates, Inc.
%O U$24.95/C$36.95 707-829-0515 fax: 707-829-0104 firstname.lastname@example.org
%P 298 p.
%T "Network Security Hacks"
Chapter one lists twenty tips for using a number of utilities and
programs to enhance the security of UNIX systems. The explanations
are clear and specific, although you would probably have to be really
familiar with UNIX administration to get the full benefit of these
suggestions. Windows gets ten hacks in chapter two. While useful,
these could have had more explanation in some cases, in regard to the
limitations and pitfalls of the recommendations.
Almost all of the network security tools discussed in chapter three
are for UNIX, although some do have Windows versions. The same is
true with the logging tips in chapter four, although there is mention
of arranging to have Windows report to a syslogd. Network monitoring,
and some analysis thereof, is in chapter five. Tunnels and VPN
(Virtual Private Network) products are detailed in chapter six. Most
of the network intrusion detection material in chapter seven concerns
Snort. (You are not my NIDS, you are a Snort!) Chapter eight lists a
few recovery and response tools.
If you run a UNIX system and network, this book enumerates many useful
tasks, settings, and tools that will help to make your systems and
network more secure.
copyright Robert M. Slade, 2004 BKNTSCHK.RVW 20041106
====================== (quote inserted randomly by Pegasus Mailer)
email@example.com firstname.lastname@example.org email@example.com
When art critics get together, they talk about form, texture,
movement, meaning. When artists get together, they talk about
where you can get the best turpentine for cheap. - Picasso
http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade