REVIEW: "Network Security Hacks", Andrew Lockart

From: Rob Slade, doting grandpa of Ryan and Trevor (rslade_at_sprint.ca)
Date: 12/22/04


Date: Wed, 22 Dec 2004 21:32:16 GMT

BKNTSCHK.RVW 20041106

"Network Security Hacks", Andrew Lockart, 2004, 0-596-00643-8,
U$24.95/C$36.95
%A Andrew Lockart
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%D 2004
%G 0-596-00643-8
%I O'Reilly & Associates, Inc.
%O U$24.95/C$36.95 707-829-0515 fax: 707-829-0104 nuts@ora.com
%O http://www.amazon.com/exec/obidos/ASIN/0596006438/robsladesinterne
  http://www.amazon.co.uk/exec/obidos/ASIN/0596006438/robsladesinte-21
%O http://www.amazon.ca/exec/obidos/ASIN/0596006438/robsladesin03-20
%P 298 p.
%T "Network Security Hacks"

Chapter one lists twenty tips for using a number of utilities and
programs to enhance the security of UNIX systems. The explanations
are clear and specific, although you would probably have to be really
familiar with UNIX administration to get the full benefit of these
suggestions. Windows gets ten hacks in chapter two. While useful,
these could have had more explanation in some cases, in regard to the
limitations and pitfalls of the recommendations. Almost all of the
network security tools discussed in chapter three are for UNIX,
although some do have Windows versions. The same is true with the
logging tips in chapter four, although there is mention of arranging
to have Windows report to a syslogd. Network monitoring, and some
analysis thereof, is in chapter five. Tunnels and VPN (Virtual
Private Network) products are detailed in chapter six. Most of the
network intrusion detection material in chapter seven concerns Snort.
(You are not my NIDS, you are a Snort!) Chapter eight lists a few
recovery and response tools.

If you run a UNIX system and network, this book enumerates many useful
tasks, settings, and tools that will help to make your systems and
network more secure.

copyright Robert M. Slade, 2004 BKNTSCHK.RVW 20041106

-- 
====================== 
rslade@vcn.bc.ca      slade@victoria.tc.ca      rslade@sun.soci.niu.edu
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
      or mirror http://sun.soci.niu.edu/~rslade/
CISSP refs:     [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews:   [Base URL]mnbk.htm
Review mailing list: send mail to techbooks-subscribe@egroups.com
                       or techbooks-subscribe@topica.com


Relevant Pages

  • REVIEW: "Network Security Hacks", Andrew Lockart
    ... %T "Network Security Hacks" ... programs to enhance the security of UNIX systems. ... network security tools discussed in chapter three are for UNIX, ...
    (alt.computer.security)
  • REVIEW: "Network Security Assessment", Chris McNab
    ... Chapter one defines network security assessment somewhere between ... Chapter twelve lists certain UNIX RPC (Remote Procedure ...
    (comp.security.misc)
  • REVIEW: "Network Security Assessment", Chris McNab
    ... Chapter one defines network security assessment somewhere between ... Chapter twelve lists certain UNIX RPC (Remote Procedure ...
    (alt.computer.security)
  • Re: FW: IP Spoofs in the log - not sure what to do next
    ... >>I am seeing a steady stream of IP Spoofs in a firewall log we track for a ... (from all 10 domains of network security). ... The spoof is being detected by the ... >world's premier event for IT and network security experts. ...
    (Incidents)
  • Re: Raising the Domain and Forest Mode
    ... causing problems establing trust relationship with NT 4.0 domain. ... LDAP server signing requirements None ... Microsoft network client: ... Network security: Do not store LAN Manager hash value on next password ...
    (microsoft.public.windows.server.active_directory)