Security sage's guide to hardening the network infrastructure

Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuratio...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Andres, Steven.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, MA : Syngress Pub., c2004.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781931836012
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02514nam a2200385 a 4500
001 1/45268
008 140821s2004 us 001 0 eng
020 |a 1931836337 (electronic bk.) 
020 |a 9781931836333 (electronic bk.) 
020 |a 9781931836012 
020 |a 1931836019 
020 |a 0080480837 
020 |a 9780080480831 
020 |a 1281052620 
020 |a 9781281052629 
035 |l 48228 
040 |a N$T  |b eng  |c N$T  |d OCLCQ  |d B24X7  |d OCLCQ  |d EBLCP  |d MERUC  |d OPELS  |d CCO  |d E7B  |d VVN  |d NTG  |d BMU  |d YDXCP  |d IDEBK  |d NRU  |d DKDLA  |d ZCU  |d OCLCO  |d FVL  |d OCLCF  |d GR-PeUP 
245 0 0 |a Security sage's guide to hardening the network infrastructure  |h [electronic resource] /  |c Steven Andres ... [et al.] ; foreword by Erik Pace Birkholz. 
246 3 0 |a Hardening the network infrastructure 
260 |a Rockland, MA :  |b Syngress Pub.,  |c c2004. 
300 |a 1 online resource. 
500 |a Title from e-book title screen (viewed Apr. 20, 2004). 
505 0 |a Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles; 
520 |a Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems. 
650 4 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a Andres, Steven. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140821  |p 00b48228  |q 00b48228  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781931836012 
856 4 |d /webopac/covers/03/48228_9781931836012.jpg 
856 4 |d /webopac/covers/03/48228_1931836019.jpg 
856 4 |d /webopac/covers/03/48228_0080480837.jpg 
856 4 |d /webopac/covers/03/48228_9780080480831.jpg 
856 4 |d /webopac/covers/03/48228_1281052620.jpg 
856 4 |d /webopac/covers/03/48228_9781281052629.jpg