A Practical Approach
The Morgan Kaufmann Series in Networking Series
Author: Harrington Jan L.Language: Anglais
Subject for Network Security:
In Print (Delivery period: 14 days).Add to cart the livre of Harrington Jan L.
384 p. · 19.1x23.5 cm · Paperback
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Chapter 2: Basic Security Architecture
Chapter 3: Physical Security
Chapter 4: Information Gathering
Chapter 5: Gaining and Keeping Root Access
Chapter 6: Spoofing
Chapter 7: Denial of Service Attacks
Chapter 8: Malware
Chapter 9: User and Password Security
Chapter 10: Remote Access
Chapter 11: Wireless Security
Chapter 12: Encryption
Appendix A: The TCP/IP Protocol Stack
Appendix B: TCP and UDP Ports
Appendix C: Security Update Sites