Résumé
Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization's network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes:
- Understanding security from a topological perspective
- Configuring Cisco router security features
- Selecting and configuring a firewall
- Configuring Cisco's PIX firewall
- Configuring an intrusion detection system
- Providing data redundancy
- Configuring a Virtual Private Network
- Securing your wireless network
- Implementing authentication and encryption solutions
- Recognizing hacker attacks
- Detecting and eradicating viruses
- Getting up-to-date security information
- Locking down Windows NT/2000/XP servers
- Securing UNIX, Linux, and FreBSD systems
- 1 A Systems Analysis Approach to Information Technology
- 2 Security as a Process
- 3 Understanding How Network Systems Communicate
- 4 Topology Security
- 5 Firewalls
- 6 Cisco's PIX Firewall
- 7 Intrusion Detection Systems
- 8 Authentication and Encryption
- 9 Virtual Private Networking
- 10 Viruses, Trojans, and Worms
- 11 Disaster Prevention and Recovery
- 12 The Wide World of Windows
- 13 Unix-Based Systems
- 14 The Anatomy of an Attack
- 15 Security Resources
- Appendix A Operating System Security Checklists
- Appendix B Sample Network Usage Policy
L'auteur - Chris Brenton
, CNE, MCSE, CDS, is currently lead security research engineer for a cyber-terrorism lab at Darthmouth College. His other books include Multiprotocol Network Design & Troubleshooting and Mastering Network Security, both published by Sybex™.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Sybex |
Auteur(s) | Chris Brenton, Cameron Hunt |
Parution | 14/11/2002 |
Nb. de pages | 506 |
Format | 19 x 23 |
Couverture | Broché |
Poids | 835g |
Intérieur | Noir et Blanc |
EAN13 | 9780782141429 |
ISBN13 | 978-0-7821-4142-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet