Verkauf durch Sack Fachmedien

Harrington

Network Security: A Practical Approach

Medium: Buch
ISBN: 978-0-12-311633-8
Verlag: MORGAN KAUFMANN PUBL INC
Erscheinungstermin: 25.04.2005
Lieferfrist: bis zu 10 Tage

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.

You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures.


Produkteigenschaften


  • Artikelnummer: 9780123116338
  • Medium: Buch
  • ISBN: 978-0-12-311633-8
  • Verlag: MORGAN KAUFMANN PUBL INC
  • Erscheinungstermin: 25.04.2005
  • Sprache(n): Englisch
  • Auflage: Erscheinungsjahr 2005
  • Serie: Morgan Kaufmann Series in Netw
  • Produktform: Kartoniert
  • Gewicht: 794 g
  • Seiten: 384
  • Format (B x H x T): 189 x 234 x 23 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Autoren

Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.

Chapter 1: In the Beginning
Chapter 2: Basic Security Architecture
Chapter 3: Physical Security
Chapter 4: Information Gathering
Chapter 5: Gaining and Keeping Root Access
Chapter 6: Spoofing
Chapter 7: Denial of Service Attacks
Chapter 8: Malware
Chapter 9: User and Password Security
Chapter 10: Remote Access
Chapter 11: Wireless Security
Chapter 12: Encryption
Appendix A: The TCP/IP Protocol Stack
Appendix B: TCP and UDP Ports
Appendix C: Security Update Sites
Glossary
Index