Cargando…

Network Security Hacks: Tips & Tools for Protecting Your Privacy

This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, includ...

Descripción completa

Detalles Bibliográficos
Autor principal: Lockhart, Andrew
Lenguaje:eng
Publicado: O'Reilly Media Inc. 2009
Materias:
Acceso en línea:http://cds.cern.ch/record/1320125
_version_ 1780921504269074432
author Lockhart, Andrew
author_facet Lockhart, Andrew
author_sort Lockhart, Andrew
collection CERN
description This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.
id cern-1320125
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher O'Reilly Media Inc.
record_format invenio
spelling cern-13201252021-04-22T01:10:11Zhttp://cds.cern.ch/record/1320125engLockhart, AndrewNetwork Security Hacks: Tips & Tools for Protecting Your PrivacyComputing and ComputersThis second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.O'Reilly Media Inc.oai:cds.cern.ch:13201252009
spellingShingle Computing and Computers
Lockhart, Andrew
Network Security Hacks: Tips & Tools for Protecting Your Privacy
title Network Security Hacks: Tips & Tools for Protecting Your Privacy
title_full Network Security Hacks: Tips & Tools for Protecting Your Privacy
title_fullStr Network Security Hacks: Tips & Tools for Protecting Your Privacy
title_full_unstemmed Network Security Hacks: Tips & Tools for Protecting Your Privacy
title_short Network Security Hacks: Tips & Tools for Protecting Your Privacy
title_sort network security hacks: tips & tools for protecting your privacy
topic Computing and Computers
url http://cds.cern.ch/record/1320125
work_keys_str_mv AT lockhartandrew networksecurityhackstipstoolsforprotectingyourprivacy