ACCU Home page ACCU Conference Page
Search Contact us ACCU at Flickr ACCU at GitHib ACCU at Facebook ACCU at Linked-in ACCU at Twitter Skip Navigation

Search in Book Reviews

The ACCU passes on review copies of computer books to its members for them to review. The result is a large, high quality collection of book reviews by programmers, for programmers. Currently there are 1949 reviews in the database and more every month.
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
    View all alphabetically
Title:
Internet Security Professional Reference 2nd ed
Author:
D Atkins et al
ISBN:
1-56205-760-X
Publisher:
New Riders Pub.
Pages:
916pp+CD
Price:
£61.49
Reviewer:
Brian Bramer
Subject:
security; internet
Appeared in:
10-2
As soon as the company network is connected to the Internet (even for something as simple as email) one has the problem of the security not only of confidential information but also public information, i.e. hackers altering the companies web pages (remember the occasion when the CIA's web page was modified to read'Welcome to the Central Stupidity Agency').

This massive text takes one in detail through planning, implementing and administering a secure Internet connection. Part one covers TCP/IP basics (address, network configuration/access files, TCP/IP daemons), understanding UUCP (the 'UNIX to UNIX CoPy' software which can transfer files from one system to another and execute programs on remote systems) and audit trails (e.g. for tracking security violations and attempted break-in). Part two then deals with securing the Internet gateway discussing spoofing (one machine masquerading as another),

sniffing(picking up data as it travels through the network), firewalls (the TIS Firewall is used as an example),SATAN(a program which can automate attacks allowing administrators to test their security) andKerberos(a network authentication system). Part three looks at message security, i.e. once an apparently valid message is past the firewall how to ensure that it will not compromise security. For example, Java and GCI security are discussed followed by a detailed examina-tion of viruses. The CD contains a number of utilities.

An easy to read, well structured book that would be very useful for professional network administrators. In summary it explains the techniques used by intruders to bypass security measures, how a network administrator sets up firewalls and encrypts data to prevent this and then, how to test the resultant system. Too specialised (and expensive) to be a set student text but very good background reading.