Articoli correlati a Inside Network Perimeter Security

Inside Network Perimeter Security - Brossura

 
9780672327377: Inside Network Perimeter Security

Sinossi

Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security.Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems makeInside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore

Stephen Northcutt is a graduate of Mary Washington College. Before entering the field of computer security, he worked as a Navy helicopter search and rescue crewman, whitewater raft guide, chef, martial arts instructor, cartographer, and network designer. Stephen is author/coauthor of Incident Handling Step-by-Step, Intrusion Signatures and Analysis,Inside Network Perimeter Security, 2nd Edition, IT Ethics Handbook,SANS Security Essentials, SANS Security Leadership Essentials, and Network Intrusion Detection, 3rd Edition. He was the original author of the Shadow Intrusion Detection System before accepting the position of Chief for Information Warfare at the Ballistic Missile Defense Organization. Stephen currently serves as Director of the SANS Institute.

Lenny Zeltser's work in information security draws upon experience in system administration, software architecture, and business administration. Lenny has directed security efforts for several organizations, co-founded a software company, and consulted for a major financial institution. He is a senior instructor at the SANS Institute, having written and taught a course on reverse-engineering malware. Lenny is also a coauthor of books such asSANS Security Essentials and Malware: Fighting Malicious Code. He holds a number of professional certifications, including CISSP and GSE, and is an incident handler at SANS Internet Storm Center. Lenny has earned a bachelor of science in engineering degree from the University of Pennsylvania and a master in business administration degree from MIT. More information about Lenny's projects and interests is available athttp://www.zeltser.com.

Scott Winters has been working in all aspects of networking and computer security for over 14 years. He has been an Instructor, Network Engineer, and Systems Administrator and is currently employed as a Senior Consultant for Unisys at the Commonwealth of Pennsylvania Enterprise Server Farm. He has SANS GIAC Firewalls and Incident Handling certifications, as well as MCSE, CNE, Cisco CCNP, CCDP, and other industry certifications. Other accomplishments include authoring and editing of SANS GIAC Training and Certification course content, as well as exam content. He was a primary author of the first edition ofInside Network Perimeter Security and a contributing author for SANS Security Essentials with CISSP CBK. He has also been involved in the SANS GIAC Mentoring program and has served on the SANS GCFW Advisory Board.

Karen Kent is an Associate with Booz Allen Hamilton, where she provides guidance to Federal agencies on a broad range of information assurance concerns, including incident handling, intrusion detection, VPNs, log monitoring, and host security. Karen has earned a bachelor's degree in computer science from the University of Wisconsin-Parkside and a master's degree in computer science from the University of Idaho. She holds the CISSP certification and four SANS GIAC certifications. Karen has contributed to several books, including Intrusion Signatures and Analysis, published numerous articles on security, and coauthored several publications for the National Institute of Standards and Technology (NIST), including NIST Special Publication 800-61: Computer Security Incident Handling Guide.

Ronald W. Ritchey has an active interest in secure network design and network intrusion techniques. He gets to exercise this interest regularly by conducting penetration testing efforts for Booz Allen Hamilton, where he has had the opportunity to learn firsthand the real-world impact of network vulnerabilities. He is also an active researcher in the field with peer-reviewed publications in the area of automated network security analysis. Ronald has authored courses on computer security that have been taught across the c

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreSams
  • Data di pubblicazione2005
  • ISBN 10 0672327376
  • ISBN 13 9780672327377
  • RilegaturaCopertina flessibile
  • Numero edizione2
  • Numero di pagine734
  • RedattoreNorthcutt Stephen

Altre edizioni note dello stesso titolo

9788129710154: Inside Network Perimeter Security, 2E

Edizione in evidenza

ISBN 10:  8129710153 ISBN 13:  9788129710154
Brossura

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

Zeltser, Lenny; Winters, Scott; Northcutt, Stephen [Editor]
Editore: Sams, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato paperback

Da: Orion Tech, Kingwood, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

paperback. Condizione: Good. Codice articolo 0672327376-3-27359206

Contatta il venditore

Compra usato

EUR 5,33
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Zeltser, Lenny; Winters, Scott
Editore: Sams, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Brossura

Da: SecondSale, Montgomery, IL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Acceptable. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00067040694

Contatta il venditore

Compra usato

EUR 5,34
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Zeltser, Lenny; Winters, Scott
Editore: Sams, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Brossura

Da: SecondSale, Montgomery, IL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00071698893

Contatta il venditore

Compra usato

EUR 5,34
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Northcutt, Stephen; Zeltser, Lenny; Winters, Scott
Editore: Sams Publishing, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Paperback

Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 2.2. Codice articolo G0672327376I5N00

Contatta il venditore

Compra usato

EUR 6,05
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Northcutt, Stephen; Zeltser, Lenny; Winters, Scott
Editore: Sams Publishing, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Paperback

Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.2. Codice articolo G0672327376I3N00

Contatta il venditore

Compra usato

EUR 6,05
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Northcutt, Stephen; Zeltser, Lenny; Winters, Scott
Editore: Sams Publishing, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Paperback

Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.2. Codice articolo G0672327376I4N00

Contatta il venditore

Compra usato

EUR 6,05
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Kent, Karen, Winters, Scott, Northcutt, Stephen, Ritchey, Ronald W., Zeltser, Lenny
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Brossura

Da: Better World Books, Mishawaka, IN, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Good. 2nd Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 9027929-6

Contatta il venditore

Compra usato

EUR 6,55
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Kent, Karen, Winters, Scott, Northcutt, Stephen, Ritchey, Ronald W., Zeltser, Lenny
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Brossura

Da: Better World Books: West, Reno, NV, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Very Good. 2nd Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 5337257-6

Contatta il venditore

Compra usato

EUR 6,55
Convertire valuta
Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Zeltser, Lenny,Winters, Scott
Editore: Sams, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato paperback

Da: Once Upon A Time Books, Siloam Springs, AR, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

paperback. Condizione: Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . Codice articolo mon0001080073

Contatta il venditore

Compra usato

EUR 3,47
Convertire valuta
Spese di spedizione: EUR 3,54
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Zeltser, Lenny
Editore: Sams, 2006
ISBN 10: 0672327376 ISBN 13: 9780672327377
Antico o usato Softcover

Da: 369 Bookstore _[~ 369 Pyramid Inc ~]_, Dover, DE, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Softcover. Condizione: Good. The need for valuable resources covering network perimeter security has never been greater. Inside Network Perimeter Security, 2E consolidates the perimeter security experience of leading SANS experts into a practical, easy to digest compendium of the best practices for prevention of intrusions and defense against those intrusions that do succeed. Starting from the essentials of perimeter security, readers will work their way through fortifying the security perimeter, designing a secure network, and maintaining and monitoring the security of the network. Tools such as firewalls, virtual private networks, routers, and intrusion detection systems are discussed and integrated to create a unified defensive architecture. In addition to updating tools to meet the needs of today, new chapters cover intrusion prevention systems and wireless security. Codice articolo AMPLE0672327376

Contatta il venditore

Compra usato

EUR 8,16
Convertire valuta
Spese di spedizione: EUR 3,58
In U.S.A.
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Vedi altre 24 copie di questo libro

Vedi tutti i risultati per questo libro