EBOOK - Active Defense - A Comprehensive Guide to Network Security (Chris Brenton)


EBOOK - Active Defense - Hướng dẫn toàn diện về an ninh mạng (Chris Brenton) - 374 Trang.

In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen.

Paying individual attention to NetWare, Windows and Unix environments, they describe how networks operate, and the authors discuss network cables, protocols, routers, bridges, hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls, Cisco router configuration settings, intrusion detection systems, authentication and encryption software, Virtual Private Networks (VPNs), viruses, trojans and worms.

CONTENTS:

Chapter 1  - Why Secure Your Network?- 8
Chapter 2  - How Much Security Do You Need?- 14
Chapter 3  - Understanding How Network Systems Communicate- 27
Chapter 4  - Topology Security- 62
Chapter 5  - Firewalls- 81
Chapter 6  - Configuring Cisco Router Security Features- 116
Chapter 7  - Check Point’s FireWall-1- 143
Chapter 8  - Intrusion Detection Systems- 168
Chapter 9  - Authentication and Encryption- 187
Chapter 10 - Virtual Private Networking- 202
Chapter 11 - Viruses, Trojans, and Worms: Oh My!- 218
Chapter 12 - Disaster Prevention and Recovery- 233
Chapter 13 - NetWare- 256
Chapter 14 - NT and Windows 2000- 273
Chapter 15 - UNIX- 309
Chapter 16 - The Anatomy of an Attack- 334
Chapter 17 - Staying Ahead of Attacks- 352
Appendix A - About the CD-ROM- 366
Appendix B - Sample Network Usage Policy- 367

LINK DOWNLOAD


EBOOK - Active Defense - Hướng dẫn toàn diện về an ninh mạng (Chris Brenton) - 374 Trang.

In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen.

Paying individual attention to NetWare, Windows and Unix environments, they describe how networks operate, and the authors discuss network cables, protocols, routers, bridges, hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls, Cisco router configuration settings, intrusion detection systems, authentication and encryption software, Virtual Private Networks (VPNs), viruses, trojans and worms.

CONTENTS:

Chapter 1  - Why Secure Your Network?- 8
Chapter 2  - How Much Security Do You Need?- 14
Chapter 3  - Understanding How Network Systems Communicate- 27
Chapter 4  - Topology Security- 62
Chapter 5  - Firewalls- 81
Chapter 6  - Configuring Cisco Router Security Features- 116
Chapter 7  - Check Point’s FireWall-1- 143
Chapter 8  - Intrusion Detection Systems- 168
Chapter 9  - Authentication and Encryption- 187
Chapter 10 - Virtual Private Networking- 202
Chapter 11 - Viruses, Trojans, and Worms: Oh My!- 218
Chapter 12 - Disaster Prevention and Recovery- 233
Chapter 13 - NetWare- 256
Chapter 14 - NT and Windows 2000- 273
Chapter 15 - UNIX- 309
Chapter 16 - The Anatomy of an Attack- 334
Chapter 17 - Staying Ahead of Attacks- 352
Appendix A - About the CD-ROM- 366
Appendix B - Sample Network Usage Policy- 367

LINK DOWNLOAD

M_tả
M_tả

Không có nhận xét nào: