Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

Find out about TCP/IP–based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP–based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications–based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks. – Covers how TCP/IP operates and how TCP/IP attacks occur. – Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000– host on such networks against different attack methods. – Describes a new attack method, a script–form attacka , which could cause a company financial problems, and its prevention. – Uses practical real–world examples of methods used to block potential attacks. Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
Find out about TCP/IP–based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP–based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications–based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks. – Covers how TCP/IP operates and how TCP/IP attacks occur. – Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000– host on such networks against different attack methods. – Describes a new attack method, a script–form attacka , which could cause a company financial problems, and its prevention. – Uses practical real–world examples of methods used to block potential attacks. Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.