Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Network Security

Buy
Mastering Network Security, 9780782123432 (0782123430), Sybex, 1998
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or minimize them. Covers all major network operating systems -- NT, NetWare, and Unix -- and all aspects of network security, from physical security of premises and equipment to anti-hacker countermeasures to setting up your own Virtual Private Networks. The CD includes evaluation and demonstration versions of commercial firewalls, intrusion detection software, and a complete security policy.

The Technology You Need is Out There. The Expertise You Need is in Here.

Expertise is what makes hackers effective. It’s what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization’s network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes:
  • Understanding security from a topological perspective
  • Configuring Cisco router security features
  • Selecting and configuring a firewall
  • Configuring Cisco’s PIX firewall
  • Configuring an intrusion detection system
  • Providing data redundancy
  • Configuring a Virtual Private Network
  • Securing your wireless network
  • Implementing authentication and encryption solutions
  • Recognizing hacker attacks
  • Detecting and eradicating viruses
  • Getting up-to-date security information
  • Locking down Windows NT/2000/XP servers
  • Securing UNIX, Linux, and FreBSD systems 
About the Author

Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.
(HTML tags aren't allowed.)

Multithreading in C# 5.0 Cookbook
Multithreading in C# 5.0 Cookbook

Multithreaded programming can seem overwhelming but this book clarifies everything through its cookbook approach. Packed with practical tasks, it's the quick and easy way to start delving deep into the power of multithreading in C#.

Overview

  • Delve deep into the .NET threading infrastructure and use...
Game Developer's Market Guide (Game Development)
Game Developer's Market Guide (Game Development)
This book is for everyone involved in game development and for those who
want to break into the industry.
Calling someone a “game developer” covers a lot of territory. A developer might be
an artist making 3D models; a producer handling external development; a level
designer or composer; a programmer or writer. The
...
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Deafness and Challenging Behaviour: The 360° Perspective
Deafness and Challenging Behaviour: The 360° Perspective

Challenging behaviours, such as aggression and violence, are more common in deaf people than hearing people. Filling a crucial gap in the international market, this book will appeal equally to those who work occasionally or entirely with Deaf or hearing impaired client groups of all ages.

Multi-disciplinary professionals with...

Teach Yourself VISUALLY Office 2008 for Mac
Teach Yourself VISUALLY Office 2008 for Mac

Learn to use all parts of Office for Mac with this easy, visual method

Since its release in January 2008, Microsoft Office 2008 for the Mac has sold faster than any previous edition. Including Word, Excel, PowerPoint, and Entourage, this office productivity suite has the tools you need for word processing, spreadsheets, presentations,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy