ACCU Home page ACCU Conference Page
Search Contact us ACCU at Flickr ACCU at GitHib ACCU at Facebook ACCU at Linked-in ACCU at Twitter Skip Navigation

Search in Book Reviews

The ACCU passes on review copies of computer books to its members for them to review. The result is a large, high quality collection of book reviews by programmers, for programmers. Currently there are 1949 reviews in the database and more every month.
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
    View all alphabetically
Intrusion Detection Network Security Beyond the Firewall
Terry Escamilla
0 471 29000 9
Al Lines
Appeared in:
With the increasingly widespread use of the Internet by all, the security of the data accessible by it is becoming of paramount importance. As part of the Data Protection Act, data owners must ensure that personal data held is inaccessible to those not permitted to see it. It is in this context that such a book comes into its own.

Most companies with access to the Internet have a firewall between them and the Internet. However, how is this configured? Can hackers penetrate it? This book will not help (directly) the hackers, with no loopholes actually being described, instead dealing with the security models you can apply to ensure hackers do not have access. It takes the reader gently but firmly through the basics that they ought to have in place even before connecting a computer to the Internet, or even local network. Key issues like regular monitoring of the access users have, and whether anyone is trying to step outside of this keep recurring. It keeps emphasising that detection tools on their own are not enough--you need to monitor it by hand too.

For those involved in defining security policy and user access, this book is certainly worth reading. If you just want a general overview of the topic, you might find this a little too heavy a tome.