Литмир - Электронная Библиотека
Network Security
Добавить похожую книгу
RNA Interference
Похожа
Непохожа
Crystallography Made Crystal Clear
Автор: Rhodes Gale (EN)
Похожа
Непохожа
Chemically Bonded Phosphate Ceramics
Автор: Wagh Arun S. (EN)
Похожа
Непохожа
New Big Book of U.S. Presidents
Автор: Davis Todd (EN)
Похожа
Непохожа
Secrets In Prior's Ford
Автор: Houston Eve (EN)
Похожа
Непохожа
Red Hot Touch
Автор: Hanauer Jon (EN)
Похожа
Непохожа
Desperate
Похожа
Непохожа
It Runs in the Family
Автор: Cooney Ray (EN)
Похожа
Непохожа
Network Security
Author:Harrington Jan L. (EN)
Language of a book: Английский
Language of an original book: Английский
Publisher: Gardners Books

    Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures.+ Helps you see through a hacker's eyes so you can make your network more secure.+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.+ Covers techniques for enhancing the physical security of your systems and network.+ Explains how hackers use information-gathering to find and exploit security flaws.+ Examines the most effective ways to prevent hackers from gaining root access to a server.+ Addresses Denial of Service attacks, "malware," and spoofing.+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

    Поделиться:
    ]]>Facebook :1]]>  ]]>Twitter :1]]>  ]]>В контакте :1]]>  ]]>Livejournal :1]]>  ]]>Мой мир :1]]>  ]]>Gmail :1]]>  Email :0  ]]>Скачать :1]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и отзывы вам нужно зайти на сайт или зарегистрироваться

    {"b":"300975","o":30}