JonHoyle.com Mirror of MacCompanion
http://www.maccompanion.com/macc/archives/January2007/Books/NetworkSecurityHacks.htm


Network Security Hacks: Tips & Tools for Protecting Your Privacy, 2nd Edition

Reviewed by Robert Pritchett

Author: Andrew Lockhart

http://www.oreilly.com/catalog/netsechacks2/index.html

Released: October 2006.

Pages: 455

$30 USD, $39 CND, £21 GBP, 24 € Euro

ISBN: 0596527632

For System Admins and Security Specialists.

Strengths: Covers Linux, BSD and Windows security issues and what to do about them.

Weaknesses: None found.

What They Say

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

Conclusion

If you want to master security issues regarding Unix variants, BSD variants or Windows variants, you’ve come to the right place, because this you can peruse 125 different “hacks”.

Very few of the hacks discuss Mac OS X – and that is a good thing! There are 12 chapters on Unix and Windows hosting, privacy and anonymity, firewalling, encryption and securing services, network, wireless security, logging, monitoring and trending, secure tunnels, network intrusion detection and recovery and response, so nearly all, if not all, bases are covered under one cover.


















Contact Us | ©1996-2007 MPN LLC.

Who links to macCompanion.com?