How to cheat at securing your network

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Dubrawsky, Ido.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Burlington, MA : Syngress, c2007.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597492317
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 03329nam a2200325 a 4500
001 1/44919
008 140717s2007 us 001 0 eng
020 |a 9780080558646 (electronic bk.) 
020 |a 008055864X (electronic bk.) 
020 |a 9781597492317 
020 |a 1597492310 
035 |l 47876 
040 |a N$T  |b eng  |c N$T  |d OCLCQ  |d OSU  |d IDEBK  |d E7B  |d OCLCQ  |d EBLCP  |d OCLCO  |d OCLCQ  |d OPELS  |d DKDLA  |d UMI  |d DEBSZ  |d GR-PeUP 
245 0 0 |a How to cheat at securing your network  |h [electronic resource] /  |c [Ido Dubrawksy, technical editor]. 
246 3 0 |a Securing your network 
260 |a Burlington, MA :  |b Syngress,  |c c2007. 
300 |a 1 online resource (xix, 409 p.) :  |b ill. 
500 |a Statement of responsibility from cover. 
500 |a Includes index. 
520 8 |a Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit. 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Computer security. 
655 4 |a Electronic books. 
700 1 |a Dubrawsky, Ido. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140718  |p 00b47876  |q 00b47876  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781597492317 
856 4 |d /webopac/covers/03/47876_9780080558646.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/47876_008055864X.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/47876_9781597492317.jpg 
856 4 |d /webopac/covers/03/47876_1597492310.jpg