Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Active Defense
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Active Defense

Active Defense

A Comprehensive Guide to Network Security

Chris Brenton, Cameron Hunt

723 pages, parution le 15/04/2001

Résumé

Get the Know-How To Optimize Today's Leading Security Technologies

Today's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead of mischief and thievery. Active Defense: A Comprehensive Guide to Network Security gives you precisely the knowledge and expertise you're looking for. You'll work smarter by day, and sleep easier by night. Coverage includes:

  • Configuring Cisco router security features
  • Selecting and configuring a firewall
  • Configuring an Intrusion Detection System
  • Providing data redundancy
  • Configuring a Virtual Private Network
  • Implementing authentication and encryption technologies
  • Recognizing hacker attacks
  • Getting up-to-date security information
  • Locking down Windows NT and 2000 servers
  • Securing UNIX, Linux, and FreeBSD systems
  • Protecting NetWare servers from attack
Contents
  • Introduction
  • Chapter 1: Why Secure Your Network?
  • Chapter 2: How Much Security Do You Need?
  • Chapter 3: Understanding How Network Systems Communicate
  • Chapter 4: Topology Security
  • Chapter 5: Firewalls
  • Chapter 6: Configuring Cisco Router Security Feature
  • Chapter 7: Check Point's FireWall-1
  • Chapter 8: Intrusion Detection Systems
  • Chapter 9: Authentication and Encryption
  • Chapter 10: Virtual Private Networking
  • Chapter 11: Viruses, Trojans, and Worms: Oh My!
  • Chapter 12: Disaster Prevention and Recovery
  • Chapter 13: NetWare
  • Chapter 14: NT and Windows 2000
  • Chapter 15: UNIX
  • Chapter 16: The Anatomy of an Attack
  • Chapter 17: Staying Ahead of Attacks
  • Appendix A: About the CD-ROM
  • Appendix B: Sample Network Usage Policy
  • Index

L'auteur - Chris Brenton

Chris Brenton

, CNE, MCSE, CDS, is currently lead security research engineer for a cyber-terrorism lab at Darthmouth College. His other books include Multiprotocol Network Design & Troubleshooting and Mastering Network Security, both published by Sybex™.

Caractéristiques techniques

  PAPIER
Éditeur(s) Sybex
Auteur(s) Chris Brenton, Cameron Hunt
Parution 15/04/2001
Nb. de pages 723
Format 19 x 22,7
Couverture Broché
Poids 1270g
Intérieur Noir et Blanc
EAN13 9780782129168

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription