Special Ops: Host and Network Security for Microsoft Unix and Oracle

Download Special Ops: Host and Network Security for Microsoft Unix and Oracle PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080481051
Total Pages : 1041 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis Special Ops: Host and Network Security for Microsoft Unix and Oracle by : Syngress

Download or read book Special Ops: Host and Network Security for Microsoft Unix and Oracle written by Syngress and published by Elsevier. This book was released on 2003-03-11 with total page 1041 pages. Available in PDF, EPUB and Kindle. Book excerpt: Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch. Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.

Special OPS

Download Special OPS PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 1014 pages
Book Rating : 4.:/5 (728 download)

DOWNLOAD NOW!


Book Synopsis Special OPS by : Erik Pace Birkholz

Download or read book Special OPS written by Erik Pace Birkholz and published by . This book was released on 2003 with total page 1014 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Special Ops

Download Special Ops PDF Online Free

Author :
Publisher : Syngress
ISBN 13 : 9781931836692
Total Pages : 1046 pages
Book Rating : 4.8/5 (366 download)

DOWNLOAD NOW!


Book Synopsis Special Ops by : Erik Pace Birkholz

Download or read book Special Ops written by Erik Pace Birkholz and published by Syngress. This book was released on 2003 with total page 1046 pages. Available in PDF, EPUB and Kindle. Book excerpt: Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. ØUnprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields.-

Special Ops: Host and Network Security for Microsoft Unix and Oracle

Download Special Ops: Host and Network Security for Microsoft Unix and Oracle PDF Online Free

Author :
Publisher : Syngress
ISBN 13 : 9780080481050
Total Pages : 784 pages
Book Rating : 4.4/5 (81 download)

DOWNLOAD NOW!


Book Synopsis Special Ops: Host and Network Security for Microsoft Unix and Oracle by : Syngress

Download or read book Special Ops: Host and Network Security for Microsoft Unix and Oracle written by Syngress and published by Syngress. This book was released on 2003-03-11 with total page 784 pages. Available in PDF, EPUB and Kindle. Book excerpt: Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch. Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.

Network Security Assessment: From Vulnerability to Patch

Download Network Security Assessment: From Vulnerability to Patch PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080512534
Total Pages : 412 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis Network Security Assessment: From Vulnerability to Patch by : Steve Manzuik

Download or read book Network Security Assessment: From Vulnerability to Patch written by Steve Manzuik and published by Elsevier. This book was released on 2006-12-02 with total page 412 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation. * Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system * Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine * Covers in the detail the vulnerability management lifecycle from discovery through patch.

Nokia Network Security Solutions Handbook

Download Nokia Network Security Solutions Handbook PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080479715
Total Pages : 469 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis Nokia Network Security Solutions Handbook by : Syngress

Download or read book Nokia Network Security Solutions Handbook written by Syngress and published by Elsevier. This book was released on 2002-12-03 with total page 469 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash). The only book dedicated to coverage of the latest Nokia hardware and software offerings, from the SOHO appliances to the enterprise-class IP700 series, with an emphasis on administering and securing these systems. Long-term market potential. The operating system referenced will be Nokia IPSO 3.4.1, which has an interface that has been specifically tailored to make upgrading to newer versions of IPSO simple and intuitive. In addition, the underlying interface is UNIX based, which has been a constant for over 30 years. Up-to-the-Minute Web-based Support. Once they have absorbed the content of the book, readers can receive up-to-the minute links, white papers, and analysis for one year at [email protected].

The Best Damn Windows Server 2003 Book Period

Download The Best Damn Windows Server 2003 Book Period PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080476074
Total Pages : 1033 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis The Best Damn Windows Server 2003 Book Period by : Debra Littlejohn Shinder

Download or read book The Best Damn Windows Server 2003 Book Period written by Debra Littlejohn Shinder and published by Elsevier. This book was released on 2004-06-18 with total page 1033 pages. Available in PDF, EPUB and Kindle. Book excerpt: In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003. * Everything a System Administrator will ever need to know about running a Windows Server 2003 network. * This is the book that meets the needs of today's Windows Server 2003 professional. * Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations.

Security Sage's Guide to Hardening the Network Infrastructure

Download Security Sage's Guide to Hardening the Network Infrastructure PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080480837
Total Pages : 543 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis Security Sage's Guide to Hardening the Network Infrastructure by : Steven Andres

Download or read book Security Sage's Guide to Hardening the Network Infrastructure written by Steven Andres and published by Elsevier. This book was released on 2004-05-05 with total page 543 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise. * This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures * It offers unique coverage of network design so administrators understand how they should design and protect their enterprises * Helps provide real practical solutions and not just background theory

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Download Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080505899
Total Pages : 321 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security by : T. Bradley

Download or read book Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security written by T. Bradley and published by Elsevier. This book was released on 2006-11-08 with total page 321 pages. Available in PDF, EPUB and Kindle. Book excerpt: Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely. * Written in easy to understand non-technical language that novices can comprehend * Provides detailed coverage of the essential security subjects that everyone needs to know * Covers just enough information to educate without being overwhelming

Building a VoIP Network with Nortel's Multimedia Communication Server 5100

Download Building a VoIP Network with Nortel's Multimedia Communication Server 5100 PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 008050017X
Total Pages : 513 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis Building a VoIP Network with Nortel's Multimedia Communication Server 5100 by : Larry Chaffin

Download or read book Building a VoIP Network with Nortel's Multimedia Communication Server 5100 written by Larry Chaffin and published by Elsevier. This book was released on 2006-08-31 with total page 513 pages. Available in PDF, EPUB and Kindle. Book excerpt: The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world. This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel’s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel’s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line. · If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need. · It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements · Also covers how to secure your entire multimedia network from malicious attacks

WarDriving: Drive, Detect, Defend

Download WarDriving: Drive, Detect, Defend PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 008048168X
Total Pages : 521 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis WarDriving: Drive, Detect, Defend by : Chris Hurley

Download or read book WarDriving: Drive, Detect, Defend written by Chris Hurley and published by Elsevier. This book was released on 2004-04-02 with total page 521 pages. Available in PDF, EPUB and Kindle. Book excerpt: The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. * Provides the essential information needed to protect and secure wireless networks * Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks * This is the first book to deal with the hot topic of WarDriving

WarDriving and Wireless Penetration Testing

Download WarDriving and Wireless Penetration Testing PDF Online Free

Author :
Publisher : Syngress
ISBN 13 : 9781597491112
Total Pages : 452 pages
Book Rating : 4.4/5 (911 download)

DOWNLOAD NOW!


Book Synopsis WarDriving and Wireless Penetration Testing by : Chris Hurley

Download or read book WarDriving and Wireless Penetration Testing written by Chris Hurley and published by Syngress. This book was released on 2007 with total page 452 pages. Available in PDF, EPUB and Kindle. Book excerpt: "WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.

CD and DVD Forensics

Download CD and DVD Forensics PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080500803
Total Pages : 321 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis CD and DVD Forensics by : Paul Crowley

Download or read book CD and DVD Forensics written by Paul Crowley and published by Elsevier. This book was released on 2006-12-12 with total page 321 pages. Available in PDF, EPUB and Kindle. Book excerpt: CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how to book that will give the reader tools to be able to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, law enforcement, corporate security, and private investigators will be able to be more effective in their evidence related tasks. To accomplish this the book is divided into four basic parts: (a) CD and DVD physics dealing with the history, construction and technology of CD and DVD media, (b) file systems present on CDs and DVDs and how these are different from that which is found on hard disks, floppy disks and other media, (c) considerations for handling CD and DVD evidence to both recover the maximum amount of information present on a disc and to do so without destroying or altering the disc in any way, and (d) using the InfinaDyne product CD/DVD Inspector to examine discs in detail and collect evidence. This is the first book addressing using the CD/DVD Inspector product in a hands-on manner with a complete step-by-step guide for examining evidence discs See how to open CD's and DVD'd and extract all the crucial evidence they may contain

Snort Intrusion Detection 2.0

Download Snort Intrusion Detection 2.0 PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080481000
Total Pages : 559 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis Snort Intrusion Detection 2.0 by : Syngress

Download or read book Snort Intrusion Detection 2.0 written by Syngress and published by Elsevier. This book was released on 2003-05-11 with total page 559 pages. Available in PDF, EPUB and Kindle. Book excerpt: The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.

Defending Enterprise Networks Kit

Download Defending Enterprise Networks Kit PDF Online Free

Author :
Publisher : Syngress Press
ISBN 13 : 9781931836791
Total Pages : 0 pages
Book Rating : 4.8/5 (367 download)

DOWNLOAD NOW!


Book Synopsis Defending Enterprise Networks Kit by : Thomas Shinder

Download or read book Defending Enterprise Networks Kit written by Thomas Shinder and published by Syngress Press. This book was released on 2002-12 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Defending Enterprise Networks Kit includes two books: Dr. Tom Shinder's ISA Server and Beyond and Special OPS Host and Network Security for Microsoft, UNIX, and Oracle. The former has been written, reviewed, and field tested by network and security engineers to help MCSE professionals lock down entire Microsoft enterprise networks. It delivers step-by-step explanations of how to carry out even the most complex and obscure security configurations on Windows NT 4.0, Windows 2000, and Windows .Net enterprise networks. Special OPS Host and Network Security for Microsoft, UNIX, and Oracle includes nuts-and-bolts guidelines on inventorying assets, identifying highly vulnerable systems, mapping access paths and common intrusion routes, conducting penetration testing, recognizing intruders, adopting continuing assessment techniques, staffing an internal security team, formulating and enforcing policies, building internal education programs, and more.

CheckPoint NG VPN 1/Firewall 1

Download CheckPoint NG VPN 1/Firewall 1 PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080476465
Total Pages : 641 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis CheckPoint NG VPN 1/Firewall 1 by : Syngress

Download or read book CheckPoint NG VPN 1/Firewall 1 written by Syngress and published by Elsevier. This book was released on 2003-05-11 with total page 641 pages. Available in PDF, EPUB and Kindle. Book excerpt: Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. · The reader will learn to design and configure a Virtual Private Network (VPN). · The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. · The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates.

Building DMZs For Enterprise Networks

Download Building DMZs For Enterprise Networks PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080476260
Total Pages : 831 pages
Book Rating : 4.0/5 (84 download)

DOWNLOAD NOW!


Book Synopsis Building DMZs For Enterprise Networks by : Syngress

Download or read book Building DMZs For Enterprise Networks written by Syngress and published by Elsevier. This book was released on 2003-08-04 with total page 831 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.