Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Network Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Network Security

Network Security

A Practical Approach

Jan L. Harrington

370 pages, parution le 27/05/2005

Résumé

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book?s assessments of the risks, rewards, and trade-offs related implementing security measures.

Audience
Security practitioners, managers, and administrators working in IT and networking departments.

L'auteur - Jan L. Harrington

Dr. Jan L. Harrington has been working with and writing about the Macintosh since March 1984. In her day job, she is Associate Professor and Chair of the Department of CS/IS/IT at Marist College, where she carries the torch for Macintosh users with great enthusiasm. Her 30+ published books include more than a dozen Macintosh-specific titles, including several on various flavors of the Macintosh OS.

Sommaire

  • Chapter 1: In the Beginning
  • Chapter 2: Basic Security Architecture
  • Chapter 3: Physical Security
  • Chapter 4: Information Gathering
  • Chapter 5: Gaining and Keeping Root Access
  • Chapter 6: Spoofing
  • Chapter 7: Denial of Service Attacks
  • Chapter 8: Malware
  • Chapter 9: User and Password Security
  • Chapter 10: Remote Access
  • Chapter 11: Wireless Security
  • Chapter 12: Encryption
  • Appendix A: The TCP/IP Protocol Stack
  • Appendix B: TCP and UDP Ports
  • Appendix C: Security Update Sites
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Morgan Kaufmann
Auteur(s) Jan L. Harrington
Parution 27/05/2005
Nb. de pages 370
Format 19 x 23
Couverture Broché
Poids 790g
Intérieur Noir et Blanc
EAN13 9780123116338
ISBN13 978-0-12-311633-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription