Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Mastering Network Security - Chris Brenton, Cameron Hunt

Mastering Network Security

Buch | Softcover
512 Seiten
2002 | 2nd Revised edition
Sybex Inc.,U.S. (Verlag)
978-0-7821-4142-9 (ISBN)
CHF 71,90 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
As hackers discover new ways to exploit vulnerable networks, the need for security information grows. This edition provides a systematic and practical approach to assessing threats to the network and implementing workable and effective security measures to avert them. The coverage ranges from physical network security to data theft and viruses.
Security is the hottest topic in IT, as well as everywhere else. The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security information grows. This new edition of the highly acclaimed and best-selling "Mastering Network Security" provides a systematic and practical approach to assessing threats to the network and implementing workable and effective security measures to avert them. The coverage ranges from physical network security to data theft and viruses.

Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.

Contents at a Glance. Introduction. Chapter 1: A Systems Analysis Approach to Information Technology. Chapter 2: Security as a Process. Chapter 3: Understanding How Network Systems Communicate. Chapter 4: Topology Security. Chapter 5: Firewalls. Chapter 6: CiscoOs PIX Firewall. Chapter 7: Intrusion Detection Systems. Chapter 8: Authentication and Encryption. Chapter 9: Virtual Private Networking. Chapter 10: Viruses, Trojans, and Worms. Chapter 11: Disaster Prevention and Recovery. Chapter 12: The Wide World of Windows. Chapter 13: Unix--Based Systems. Chapter 14: The Anatomy ofan Attack. Chapter 15: Security Resources. Appendix A: Operating System Security Checklists. Appendix B: Sample Network Usage Policy. Index.

Erscheint lt. Verlag 1.11.2002
Überarbeitung Cameron Hunt
Zusatzinfo illustrations
Verlagsort New York
Sprache englisch
Maße 189 x 228 mm
Gewicht 842 g
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7821-4142-0 / 0782141420
ISBN-13 978-0-7821-4142-9 / 9780782141429
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich