by June 30, 2004 0 comments

This is a comprehensive book on computer and network security. It starts with talking about hacking methods such as sniffing, viruses, worms and spoofing and then goes on to explain different types of attacks and what techniques hackers use to steal information from targeted computers. It helps you understand the hacker better, his motive and some historical hacking techniques. One disappointing part, however, is the cyber laws section, as it talks about thecyber laws in the US. It would have been really valuable had it covered the Indian cyber laws. Where this book does add value is in the security policy implementation section. Things don’t end there. It also covers key security technologies such as firewalls, VPNs, encryption techniques and security implementation for desktops, Unix and Win NT/2000/2003 environments. Information on security implementation for an e-commerce setup and for wireless networks is also covered. It has questions at the end of every chapter to test what you’ve learnt. 

The bottom line: A good book for network professionals.

Sukhsagar Prajapati

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.