» » Intranet Security: Stories from the Trenches (Sun Microsystems Press)

Free eBook Intranet Security: Stories from the Trenches (Sun Microsystems Press) download

by Linda McCarthy

Free eBook Intranet Security: Stories from the Trenches (Sun Microsystems Press) download ISBN: 0138947597
Author: Linda McCarthy
Publisher: Prentice Hall Ptr; 1st edition (September 1, 1997)
Language: English
Pages: 260
Category: Technologies and Future
Subcategory: Certification
Size MP3: 1791 mb
Size FLAC: 1508 mb
Rating: 4.7
Format: azw lrf lrf doc


The author blends statistics with real stories about computer security.

The author blends statistics with real stories about computer security. Intranet Security : Stories from the Trenches" will help you raise management's awareness of the security issues derived from the wide use of corporate intranets. Hence, true to its title, this book offers detailed narratives "from the trenches" that might help one not make the same mistakes the author has encountered during her work as a consultant.

Start by marking Intranet Security - Stories from the Trenches as Want to Read . Security consultant Linda McCarthy shows how breaches occurred, what steps were taken to deal with them - and how well they worked, what steps could have been taken to prevent the crisis.

Start by marking Intranet Security - Stories from the Trenches as Want to Read: Want to Read savin. ant to Read. In this book, you'll watch as real network administrators track hacker intrusions. You'll see firsthand how companies struggle with security problems caused by poor training, lack of mana Security consultant Linda McCarthy shows how breaches occurred, what steps were taken to deal with them - and how well they worked, what steps could have been taken to prevent the crisis.

This update is even more compelling and offers a clear plan for improving the security of your systems. You'll find useful tools and preventive measures you can take right now. In addition, McCarthy's security checklists and resource listings can help you tighten security throughout your entire IT infrastructure.

oceedings{S, title {Intranet Security - Stories from the Trenches}, author {Linda . 1. Visitors in the Night. Day 1: A Nice Night for a Hack

oceedings{S, title {Intranet Security - Stories from the Trenches}, author {Linda McCarthy}, year {1997} }. Linda McCarthy. Day 1: A Nice Night for a Hack. Day 2: Out of Sight, Out of Mind. Day 3: The Hack is Back. Days 4 to 7: Waiting to Exhale. Day 8: Too Little, Too Late. Day 9: Just the Facts. Summary: It Can Come from Within.

Intranet Security: Stories from the Trenches. Indianapolis, IN: Cisco Press, 2001 r. 47. Northcutt, Steven, Judy Novak. Network Intrusion Detection: An Analyst's Handbook

IT Security: Risking the Corporation. ISBN 9780131011120 (978-0-13-101112-0) Softcover, Prentice Hall, 2003. Find signed collectible books: 'IT Security: Risking the Corporation'. Coauthors & Alternates. Linda McCarthy, " Intranet Security: Stories from the Trenches, " Sun Microsystems Press. com/news/ ovsecurity. Adoption of Web Enablement Can Improve SMB Business.

Intranet Security : Stories from the Trenches. Sun Microsystems Press (Santa Clara, CA). ISBN 0-13-894759-7. 288 pp. (3) Intranet Journal has an extensive list of articles about intranet security at < . TERM Spring '15. PROFESSOR .

McCarthy, . Intranet Security: Stories from the Trenches. Sun Microsystems PressGoogle Scholar. 5. Bass, . Intrusion Detection Systems and Multi-sensor Data Fusion.

A guide to intranet security that shows corporate intranet managers how to learn from other's intranet security disasters. Shows how specific security beaches occurred, how they were fixed, and how you can prevent them. Also covers the problems and limits of security training, policies and procedures, risk assessment, et. (more).

Illustrates security flaws that make corporate intranets easy targets for hackers with true stories of network administrators tracking intrusions and struggling with security problems. Each chapter details a real-world case and offers advice to prevent that particular situation. Includes a glossary, acronyms, and lists of vendors and organizations. Annotation c. by Book News, Inc., Portland, Or.
User reviews
Yla
"Intranet Security : Stories from the Trenches" gives you more than the title promises. It is not only a collection of enlightening case studies, but the author also gives a brief and to-the-point analysis of each case. The morals can easily be generalized for networks other than Intranets. The book does not intend to go into technical details, so anyone who is interested in network security will find it easy to read. The chapters are well-structured and the most important messages are repeated throughout the book. My experience as an IT consultant shows that the problems highlighted in the book are common to many organizations, so it is a very useful (though not comprehensive) high level guide for Security Managers, Executives and IS Auditors.
Insanity
Linda's book is one of those that you can't put down until you have carefully consumed it all. It contains valuable information about major minor issues surrounding network and system security. Linda brings her wealth of knowledge on the subject to the table and helps the reader obtain essential information about how to create and maintain a secure computing environment. Her book addresses not only the "electronic issues" associated with computer security, but the people issues as well! Get it, read it, follow its guidelines, or someone else may soon find out you haven't....
Auau
After reading this book based on some of the recommendations I have read and receiving the book as a gift, I read it end to end, and consider it a friendly introduction to the different situations the author has encountered throughout her career. Some of the stories were enlightening in a way, true in today's world. It did not deliver the kick in the pants security stance most organizations should take in doing the right thing. Most organizations consider security as an afterthought in not as a forethought in their business models. Each scenario she describes are typical of most businesses today. The book itself references some Consulting firms that are just in their infancy state of security consulting and therefore should not have been mentioned as firms to contact. Some of the freely available tools she described have been available for quite some time, and NO new tools are referenced. Her description of would be hackers are watered down, especially Hacker definition #3 Fugitive Hacker. Some security people in this field are without degrees, and she completely unaccounts for those type of folks or x-military types. The section on Walk with a Hacker has been demonstrated over and over on the internet and the internet description is much more detailed than the brief descriptions she describes from each step. A section on why a particular hacker would execute the following steps and a map mapping getting from step 1 to the final step would have improved the section tremendously.
Akinozuru
This book is by no means a how-to book. For that you should buy "Practical Unix and Internet Security" by Spafford and Garfinkel.
"Intranet Security : Stories from the Trenches" will help you raise management's awareness of the security issues derived from the wide use of corporate intranets. Hence, true to its title, this book offers detailed narratives "from the trenches" that might help one not make the same mistakes the author has encountered during her work as a consultant. Know, if you're looking for lines of code and configuration details, go somewhere else.
Exellent
Linda's book is an effective tool. While it's certainly not a technical book (i.e. O'Reilly series), it provides an accurate depiction of what security consultants are finding in their travels and the sort of struggles that one who's interested Intranet security will see in their career. If you manage technical people, read this book. If you outsource technology functions, read this book. If you are implementing security, give this book to whoever you are implementing for.
Vonalij
This could possibly be helpful in getting a boss to see things your way in a disagreement over security -- provided you could get your boss to read a whole book on the subject. I am uncertain who the target audience is for this, but I know of no-one in that audience.
Cargahibe
This book does not show you how to secure your Intranet. Basically it tells you to have policies and procedures and to hire a security expert to audit your site. It's an easy read and has lots of interesting stories. May be an eye oppener to some people in management that have never tought about security, but if you like technical stuff this book is not for you. It makes you more security conscious, doesn't teach you anything about how to secure anything.
Written in an annoyingly chatty conversational style, this book tells the same story over and over about how clueless clients set up cyber-shop with no security whatsoever. This book is of no technical value.