The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

Shop for this book
A collection of after-action reports on a variety of network attacks, Network Intrusion Detection enables you to learn from others' mistakes as you endeavor to protect your networks from intrusion. Authors Stephen Northcutt and Judy Novak document real attacks on systems, and highlight characteristics that you--you being a network communications analyst or security specialist--can look for on your own machines. The authors mince no words, and advise you on the detection tools to use (they like and use Snort, as well as Shadow, Tripwire, TCP Wrappers, and others) and how to use them. This second edition of the book includes less about year-2000 preparation and more about the latest in attacks, countermeasures, and the growing community of wh... Rest of this review on the detail page
(Review by
I want to add my review for this book!
Reviews (3) and details of Network Intrusion Detection: An Analyst's Handbook (2nd Edition)

Shop for this book
Once again Stallings has produced the classic textbook in the field. Concentrating primarily on encryption, he gives the concepts, background, and technical detail necessary to understand, develop, and evaluate security for networks. Written in a textbook style, this work does not cover the hands-on minutiae or proprietary sets of commands for specific systems or products. The basics, however, are covered thoroughly and well. Chapter end questions are provided, as well as recommended reading lists and appendices with detail specific to particular technologies. This does not in the least preclude it from being a valuable resource for the developer or manager. copyright Robert M. Slade, 1996
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Network and Internetwork Security: Principles and Practice

Shop for this book
Book description
With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Intrusion Detection

Shop for this book
Book description
Best Ways To Protect You LAN! What's the fastest, easiest way to master all the new tools and techniques you need to maintain network security, reliability, and integrity? Richard Baker's Network Security! Inside you'll find low-cost, workable solutions for keeping your company's vital data and equipment safe from hackers, viruses, power failures, industrial spies, logic bombs, and a host of other new security threats. You'll learn to: build a security plan; assess risks; control physical access; build security procedures; master hardware and software security; overcome the perils of passwords; secure any desktop; protect and manage local area and enterprise networks; stay abreast of E-mail security/privacy issues and other legal problems; ... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Network Security: How to Plan for It and Achieve It

Shop for this book
Book description
This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers", "cyberpunks" and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and ... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Netspionage: The Global Threat to Information
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement