TAILIEUCHUNG - Sybex - Active Defense Guide to Network Security

Today's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead of mischief and thievery. Active Defense: A Comprehensive Guide to Network Security gives you precisely the knowledge and expertise you're looking for. You'll work smarter by day, and sleep easier by night | The Expertise You Need to Safeguard Your Network Against Al Threats Evaluation Security Software Chris Brenton tii Cameron Hunt A Comprehensive Guide to -Network Security release TeamOR 2001 x Active Defense A Comprehensive Gude to Network Security Table of Contents Active Defense A Comprehensive Guide to Network Security - 4 Introduction - 6 Chapter 1 - Why Secure Your Network - 8 Chapter 2 - How Much Security Do You Need - 14 Chapter 3 - Understanding How Network Systems Communicate - 27 Chapter 4 - Topology Security - 62 Chapter 5 - Firewalls - 81 Chapter 6 - Configuring Cisco Router Security Features - 116 Chapter 7 - Check Point s FireWall-1 - 143 Chapter 8 - Intrusion Detection Systems - 168 Chapter 9 - Authentication and Encryption - 187 Chapter 10 - Virtual Private Networking - 202 Chapter 11 - Viruses Trojans and Worms Oh My - 218 Chapter 12 - Disaster Prevention and Recovery - 233 Chapter 13 - NetWare - 256 Chapter 14 - NT and Windows 2000 - 273 Chapter 15 - UNIX - 309 Chapter 16 - The Anatomy of an Attack - 334 Chapter 17 - Staying Ahead of Attacks - 352 Appendix A - About the CD-ROM - 366 Appendix B - Sample Network Usage Policy - 367 page 2 Active Defense A Comprehensive Gude to Network Security Synopsis by Barry Nance In one book Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security identify the various security risks show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare Windows and Unix environments they describe how networks operate and the authors discuss network cables protocols routers bridges hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls Cisco router configuration settings intrusion detection systems authentication and encryption software Virtual Private Networks VPNs viruses trojans and worms. Back Cover

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.