Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Google Book Preview
Bulletproofing TCP/IP-Based Windows NT/2000 Networks
— —
Gilbert Held
Bulletproofing TCP/IP-Based Windows NT/2000 Networks by Gilbert Held at Abbey's Bookshop,

Bulletproofing TCP/IP-Based Windows NT/2000 Networks

Gilbert Held


John Wiley & Sons Inc

Windows 2000;
Windows NT;
Privacy & data protection;
Computer viruses, Trojans & worms;
Network security


228 pages

We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

- Covers how TCP/IP operates and how TCP/IP attacks occur.

- Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000- host on such networks against different attack methods.

- Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.

- Uses practical real-world examples of methods used to block potential attacks.

Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

By:   Gilbert Held
Imprint:   John Wiley & Sons Inc
Country of Publication:   United States
Dimensions:   Height: 236mm,  Width: 190mm,  Spine: 19mm
Weight:   618g
ISBN:   9780471495079
ISBN 10:   0471495077
Pages:   228
Publication Date:   April 2001
Audience:   College/higher education ,  Professional and scholarly ,  Professional & Vocational ,  A / AS level ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active

Preface. Acknowledgements. Introduction. The TCP/IP Protocol Suite. Network Attack Methods. The Security Role of the Router. The Role of the Firewall. The Role of the Virus Scanner and Encryption. Host Attack Methods. Working with Windows. The Role of the Scanner. Index.

Gilbert Held is an internationally recognized author and lecturer who specializes in the applications of computer and communications technology. With over 30 years ofexperience in managing communications networks, he conducts seminars on topics that include LAN/WAN internetworking, data compression, and PC hardware and software. Held has written numerous books on computers and communications technology and has been recognized for his technical excellence in writing.

My Shopping Basket
Your cart does not contain any items.