Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

Need to Know More?

Chirillo, John. Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Edition. John Wiley & Sons. Indianapolis, IN, 2002. ISBN 0471232831.

Refer to Chapter 1, "Common Ports and Services," and Chapter 4, "Safeguarding Against Penetration Attacks."

Chirillo, John. Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition. John Wiley & Sons. Indianapolis, IN, 2002. ISBN 0471232823.

Refer to Chapter 4, "Well-Known Ports and Their Services," and Chapter 5, "Discovery and Scanning Techniques."

McClure, Stuart, Joel Scambray, and George Kurtz. Hacking Exposed: Network Security Secrets and Solutions, Third Edition. McGraw-Hill. New York, NY, 2001. ISBN 0072193816.

Refer to Chapter 12, "Denial of Service Attacks."

Virus Bulletin Web site: http://www.virusbtn.com

The Twenty Most Critical Internet Security Vulnerabilities list (SANS): http://www.sans.org/top20/

The CERT Coordination Center (CERT/CC): http://www.cert.org

  • + Share This
  • 🔖 Save To Your Account