tailieunhanh - Sybex - Active Defense Guide to Network Security
Today's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead of mischief and thievery. Active Defense: A Comprehensive Guide to Network Security gives you precisely the knowledge and expertise you're looking for. You'll work smarter by day, and sleep easier by night | The Expertise You Need to Safeguard Your Network Against Al Threats Evaluation Security Software Chris Brenton tii Cameron Hunt A Comprehensive Guide to -Network Security release TeamOR 2001 x Active Defense A Comprehensive Gude to Network Security Table of Contents Active Defense A Comprehensive Guide to Network Security - 4 Introduction - 6 Chapter 1 - Why Secure Your Network - 8 Chapter 2 - How Much Security Do You Need - 14 Chapter 3 - Understanding How Network Systems Communicate - 27 Chapter 4 - Topology Security - 62 Chapter 5 - Firewalls - 81 Chapter 6 - Configuring Cisco Router Security Features - 116 Chapter 7 - Check Point s FireWall-1 - 143 Chapter 8 - Intrusion Detection Systems - 168 Chapter 9 - Authentication and Encryption - 187 Chapter 10 - Virtual Private Networking - 202 Chapter 11 - Viruses Trojans and Worms Oh My - 218 Chapter 12 - Disaster Prevention and Recovery - 233 Chapter 13 - NetWare - 256 Chapter 14 - NT and Windows 2000 - 273 Chapter 15 - UNIX - 309 Chapter 16 - The Anatomy of an Attack - 334 Chapter 17 - Staying Ahead of Attacks - 352 Appendix A - About the CD-ROM - 366 Appendix B - Sample Network Usage Policy - 367 page 2 Active Defense A Comprehensive Gude to Network Security Synopsis by Barry Nance In one book Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security identify the various security risks show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare Windows and Unix environments they describe how networks operate and the authors discuss network cables protocols routers bridges hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls Cisco router configuration settings intrusion detection systems authentication and encryption software Virtual Private Networks VPNs viruses trojans and worms. Back Cover
đang nạp các trang xem trước