Offering real-world solutions to a range of Internet security issues and situations, this practical handbook furnishes complete practical applications, from planning and design to implementation, covering such practical security technology as firewalls, intrusion detection and prevention, network security on all operating systems, and more. Original. (Intermediate)
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Tim Crothers, CCNA, CIW, MCSE, MCT, CNE, is the chief security engineer at ITM Technology LLC, a firm that offers leading-edge Internet threat management services. A specialist in TCP/IP, WAN architecture, and security, he consults, trans, and assesses security risks at companies such as IBM, Lucent Technologies, UPS, and Anderson Worldwide. He also speaks frequently on security issues at Internet World, E-Commerce Exposition, Comdex, e-Business Expo, and other industry events.
"In Internet Lockdown, Tim Crothers navigates the confusion surrounding Internet security by combining the same practical, intelligent approach he contributes to the revolutionary threat management solutions of ITM Technology LLC." --Daniel M. Helmholdt, Managing Partner, ITM Technology LLC
There's no such thing as 100 percent security - unless you unplug your hardware and bury it. But there are a lot of things you can do to minimize the risk of intrusion, many of which are relatively easy (and inexpensive) to accomplish. Written by a top security expert and peppered with real-world insights and anecdotes, this authoritative book shows you how to map out a balanced, practical security plan. The author pinpoints all of today's most popular Internet attacks. He describes in detail the kinds of security controls you need to put in place at each level of your system. And he walks you through a vivid security implementation example, spotlighting the issues you need to address each step of the way. Get the Practical Know-How You Need to Protect Your System
* Ward off trouble with solid end-user policies and procedures
* Lock down your system with the correct configurations and removal of unnecessary services
* Harness Intrusion detection and honeypots to pinpoint and counteract penetrations
* Get a handle on best practices for security administration
* Learn how to assess threats, and avoid, control, and transfer risks
* Understand vulnerabilities in RPC, BIND, RDS, Sendmail, and other favorite cracker targets
* Use cryptography, firewalls, and VPNs to ensure network data integrity as well as confidentiality, authentication, and non-repudiation
* Prevent CGI attacks, buffer overflows, and other remote intrusions with server -side application controls
* Plan, implement, test, and verify a multi-layered security infrastructure
www.hungryminds.com
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 29,36 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 7,95 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. pp. xiv + 294. Codice articolo 18274735
Quantità: 1 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. xiv + 294 1st Edition. Codice articolo 26274725
Quantità: 1 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. xiv + 294 Illus. Codice articolo 7573242
Quantità: 1 disponibili
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Codice articolo ABNR-149488
Quantità: 1 disponibili
Da: Basi6 International, Irving, TX, U.S.A.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Codice articolo ABEJUNE24-387491
Quantità: 1 disponibili
Da: dsmbooks, Liverpool, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo D7F0-4-M-0764548611-6
Quantità: 1 disponibili