Cargando…
Network Security Hacks: Tips & Tools for Protecting Your Privacy
This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, includ...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
O'Reilly Media Inc.
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1320125 |
_version_ | 1780921504269074432 |
---|---|
author | Lockhart, Andrew |
author_facet | Lockhart, Andrew |
author_sort | Lockhart, Andrew |
collection | CERN |
description | This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response. |
id | cern-1320125 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | O'Reilly Media Inc. |
record_format | invenio |
spelling | cern-13201252021-04-22T01:10:11Zhttp://cds.cern.ch/record/1320125engLockhart, AndrewNetwork Security Hacks: Tips & Tools for Protecting Your PrivacyComputing and ComputersThis second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.O'Reilly Media Inc.oai:cds.cern.ch:13201252009 |
spellingShingle | Computing and Computers Lockhart, Andrew Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title | Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title_full | Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title_fullStr | Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title_full_unstemmed | Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title_short | Network Security Hacks: Tips & Tools for Protecting Your Privacy |
title_sort | network security hacks: tips & tools for protecting your privacy |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1320125 |
work_keys_str_mv | AT lockhartandrew networksecurityhackstipstoolsforprotectingyourprivacy |