Wiley-VCH


John Wiley & Sons Bulletproofing TCP/IP-based Windows NT/2000 Networks Cover The only guide focusing on the application of TCP/IP network security methods to Windows NT/2000, th.. Product #: 978-0-471-49507-9 Regular price: $129.91 $129.91 In Stock

Bulletproofing TCP/IP-based Windows NT/2000 Networks

Held, Gilbert

Cover

1. Edition April 2001
XVIII, 290 Pages, Softcover
Wiley & Sons Ltd

Short Description

The only guide focusing on the application of TCP/IP network security methods to Windows NT/2000, this book covers all types of network security attacks and how to prevent them. In addition to explaining techniques for securing organizational networks and computers, Held provides real-world examples from Cisco and MTadministration to illustrate methods for blocking potential attacks.

ISBN: 978-0-471-49507-9
John Wiley & Sons

Buy now

Ordering and shipping via our shop or authorized distribution partners.

 

Order now

Further versions

PDF

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

- Covers how TCP/IP operates and how TCP/IP attacks occur.
- Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000- host on such networks against different attack methods.
- Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
- Uses practical real-world examples of methods used to block potential attacks.

Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

Preface.

Acknowledgements.

Introduction.

The TCP/IP Protocol Suite.

Network Attack Methods.

The Security Role of the Router.

The Role of the Firewall.

The Role of the Virus Scanner and Encryption.

Host Attack Methods.

Working with Windows.

The Role of the Scanner.

Index.