TAILIEUCHUNG - Active Defense — A Comprehensive Guide to Network Security

Focusing on network security, this text provides a systematic and practical approach to assessing threats to the network and implementing workable and effective security measures to avert them. Coverage ranges from physical network security to data theft and viruses. The CD-ROM includes evaluation and demonstration of commercial firewalls, intrusion detection software, a variety of hacker tools for testing your own network and much more. | The Expertise You Need to Safeguard Your Network Against AM Threats Evaluation LSecurity Software Chris Brenton vxtii Cameron Hunt A Comprehensive Guide to VNetwork Security release TeamOR 2001 x Active Defense A Comprehensive Guide to Network Security Table of Contents Active Defense A Comprehensive Guide to Network Security - 4 Introduction - 6 Chapter 1 - Why Secure Your Network - 8 Chapter 2 - How Much Security Do You Need - 14 Chapter 3 - Understanding How Network Systems Communicate - 27 Chapter 4 - Topology Security - 62 Chapter 5 - Firewalls - 81 Chapter 6 - Configuring Cisco Router Security Features - 116 Chapter 7 - Check Point s FireWall-1 - 143 Chapter 8 - Intrusion Detection Systems - 168 Chapter 9 - Authentication and Encryption - 187 Chapter 10 - Virtual Private Networking - 202 Chapter 11 - Viruses Trojans and Worms Oh My - 218 Chapter 12 - Disaster Prevention and Recovery - 233 Chapter 13 - NetWare - 256 Chapter 14 - NT and Windows 2000 - 273 Chapter 15 - UNIX - 309 Chapter 16 - The Anatomy of an Attack - 334 Chapter 17 - Staying Ahead of Attacks - 352 Appendix A - About the CD-ROM - 366 Appendix B - Sample Network Usage Policy - 367 page 2 Active Defense A Comprehensive Guide to Network Security Synopsis by Barry Nance In one book Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security identify the various security risks show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare Windows and Unix environments they describe how networks operate and the authors discuss network cables protocols routers bridges hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls Cisco router configuration settings intrusion detection systems authentication and encryption software Virtual Private Networks VPNs viruses trojans and worms. Back

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.