tailieunhanh - Ebook Network security illustrated: Phần 1
Security concepts are organized based on business needs, as opposed to tech-nological similarity. We’ve tried to focus on how these concepts relate in terms of practical business functionality. For example, network monitoring is discussed in Part 1, "Managing Security " rather than in a section on intrusion detection. For people with a technical background, this method of organization may seem strange. But one of our goals is to change the way people think about security. As we’ll say many times throughout the book, security is not a technological issue; it’s a business issue. | Jason Albanese Wes Sonnenreich Network Security Illustrated STOP i or Intrusion detection and disaster recovery Secure storage and access of information Identification and authentication of users Security management and outsourcing Visual components add to the book s appeal Network Security Illustrated Jason Albanese Wes Sonnenreich McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright 2004 by Jason Albanese and Wes Sonnenreich. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976 no part of this publication may be reproduced or distributed in any form or by any means or stored in a database or retrieval system without the prior written permission of the publisher. 0-07-143355-4 The material in this eBook also appears in the print version of this title 0-07-141504-1 All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name we use names in an editorial fashion only and to the benefit of the trademark owner with no intention of infringement of the trademark. Where such designations appear in this book they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in corporate training programs. For more information please contact George Hoare Special Sales at george_hoare@ or 212 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies Inc. McGraw-Hill and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work you may not decompile disassemble reverse engineer reproduce modify create derivative works based upon transmit distribute disseminate sell
đang nạp các trang xem trước