The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor.
Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include:
About the Author
- Why and how hackers do what they do
- How encryption and authentication work
- How firewalls work
- Understanding Virtual Private Networks (VPNs)
- Risks posed by remote access
- Setting up protection against viruses, worms, and spyware
- Securing Windows computers
- Securing UNIX and Linux computers
- Securing Web and email servers
- Detecting attempts by hackers
Matthew Strebe is the best-selling author of numerous books, including Firewalls: 24seven from Sybex. He is the Chief Technology Officer of Connetic, an IT outsourcing firm headquartered in San Diego, and wastes his scant spare time writing www.slashnot.com. Matt's long history of networking includes installing the US Navy's first fiber-optic local area network on a ship.
Record Label Marketing, Second Edition
The concept of selling recorded music has been around for more than a century. While the actual storage medium for music has evolved, from cylinders to vinyl discs, magnetic tape, digital discs, and now downloads, the basic notion has remained the same: a musical performance is captured to be played back at a later time, at the convenience of...
Structure-based Drug Discovery
This book describes some of the most exciting developments for the discovery of new drugs, such as Fragment-based methods. It contains the latest developments in technologies that can be used to obtain the 3-D structures. This book includes experimental approaches using X-ray crystallography and NMR for Fragment-based screening as well as...
Linux (Hacking Exposed)
From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...
Learn how to think like a hacker in order to secure your Linux network
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...
Beginning InfoPath 2003 (Programmer to Programmer) Beginning InfoPath 2003
Microsoft InfoPath 2003 allows users to create forms that can be used immediately for data gathering, analysis, and reporting. This book provides everything you need to maximize the potential of this unique tool.
Whether you're looking to create streamlined forms, understand the code behind InfoPath forms,...