Advertisement
Membership
Login
ACCU Buttons
Search in Book Reviews
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
Most companies with access to the Internet have a firewall between them and the Internet. However, how is this configured? Can hackers penetrate it? This book will not help (directly) the hackers, with no loopholes actually being described, instead dealing with the security models you can apply to ensure hackers do not have access. It takes the reader gently but firmly through the basics that they ought to have in place even before connecting a computer to the Internet, or even local network. Key issues like regular monitoring of the access users have, and whether anyone is trying to step outside of this keep recurring. It keeps emphasising that detection tools on their own are not enough--you need to monitor it by hand too.
For those involved in defining security policy and user access, this book is certainly worth reading. If you just want a general overview of the topic, you might find this a little too heavy a tome.