HackNotes Network Security Portable Reference - Brossura

Horton, Michael; Mugge, Clinton

 
9780072227833: HackNotes Network Security Portable Reference

Sinossi

Here’s the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architecture solutions. Plus, learn to use a full complement of effective, up-to-date security tools.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sugli autori

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

Dalla quarta di copertina

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code level techniques. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.

  • Use information security and risk assessment principles
  • Guard against common network threats and vulnerabilities
  • Understand hacker tactics and methods seen on the Internet and intranet
  • Protect common hacker and criminal targets
  • Conduct best practice security checks and hardening steps for your systems
  • Implement wireless security, Web application security, incident response, and more
  • Reference operating system and security specific commands
  • Access and utilize the best security and hacker tools in use today
  • Focus on the techniques, results, and remediation for a wide range of exploits
  • Protect networks, software code, e-commerce, and more

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.