Press Release: May 14, 2004
"Network Security Hacks": An Arsenal of Useful Techniques for Network Defense
Sebastopol, CA--Villains and rogues have a way of snaring our attention. Perhaps it's our romantic conceptions of a life lived outside of the law. Consider "black hat" hackers. It's easy to imbue these characters with Robin Hood-like qualities--clever, daring, and always one step ahead of an authoritarian establishment. We forget that their intent is malicious. That is, we forget until it's directed toward us. Then, we see how pointless and devastating the damage they wreak can be. The unsung heroes are those who quietly protect our networks and data from intruders. It's an endless and demanding task, not necessarily filled with high drama, but one on which everyone who uses a computer or the Internet relies. Network Security Hacks (O'Reilly, US $24.95) by Andrew Lockhart was written for these individuals, and it offers a wealth of useful techniques to make their job of detecting and dealing with intruders easier.
"The difference between 'white hat' and 'black hat' hackers isn't the tools or the techniques they use (or even the color of their hats), but their intent," explains Lockhart. "The difference is subtle but important. White hat hackers find that building secure systems presents an interesting challenge, and their security can be tested only through a thorough knowledge of how to subvert such systems. Black hat hackers--more appropriately called 'crackers'--pursue precisely the same knowledge, but without regard for the people who built the systems or the servers they attack."
Every day system crackers take advantage of vulnerable computers, turning them into spam relays or participants in distributed denial-of-service attacks, or using them to hide other unsavory activities. Network Security Hacks presents 100 industrial-strength techniques that network and system administrators can use to make sure their networks are not targets of opportunity. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, this compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques.
Readers will learn how to detect the presence (and track every keystroke)
of network intruders, methods for protecting their networks and data using
strong encryption, and even techniques for laying traps for would-be
system crackers. The book presents important security tools, as well as
clever methods for using them to reveal timely and useful information
about what is happening on your network. Readers will learn how to:
Written for the intermediate to advanced network administrator, Network Security Hacks divulges practical, ingenious solutions to real-world networking problems. Using just one of these hacks will give readers an edge in the battle for network security. The other ninety-nine make this book absolutely invaluable.
- Several sample hacks, including "Block OS Fingerprinting" and "Write Your Own Snort Rules"
- More information about the book, including table of contents, index, author bio, and samples
- A cover graphic in JPEG format
For almost 40 years, O’Reilly Media has provided technology and business training, knowledge, and insight to help companies succeed. Our unique network of experts and innovators share their knowledge and expertise through the company’s Safari training and learning platform and at O’Reilly conferences. As a SaaS learning platform, Safari delivers highly topical and comprehensive technology and business learning solutions to millions of users across enterprise, consumer, and university channels. For more information visit oreilly.com.
Return to: O'Reilly Press Room