Cantitate/Preț
Produs

Hardening Network Security

Autor John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, Paul Love, Rob Kraft, Mark O'Neill
en Limba Engleză Paperback – 15 feb 2005
Take a proactive approach to network security by implementing preventive measures against attacks--beforethey occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.
Features a four-part hardening methodology:
  • Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack
  • Take It From The Top--Systematic approach to hardening your enterprise from the top down
  • Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing
  • How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program
Citește tot Restrânge

Preț: 25151 lei

Preț vechi: 31438 lei
-20% Nou

Puncte Express: 377

Preț estimativ în valută:
4815 5005$ 3992£

Carte disponibilă

Livrare economică 16-30 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780072257038
ISBN-10: 0072257032
Pagini: 593
Ilustrații: 1
Greutate: 1.01 kg
Ediția:New.
Editura: McGraw Hill Education
Colecția McGraw-Hill Education
Locul publicării:United States

Cuprins

Part I: Do This Now!

Chapter 1: Do These 7 Things Before You Do Anything Else

Part II: Take it From the Top. Systematically Hardening Your Enterprise

Chapter 2: Break the Network into Areas of Common Functionality

Chapter 3: Hardening with Identity Management Systems

Chapter 4: Hardening Cross Platform Authentication

Chapter 5: Implement Secure Centralized Authentication Mechanisms

Chapter 6: Mobile Authentication Considerations

Chapter 7: Beyond Access Controls - Protecting Stored Data

Chapter 8: Hardening Database Access

Chapter 9: Hardening Cross Platform Access Controls

Chapter 10: Hardening Data Transport Using Encryption

Chapter 11: Hardening Remote Clients (Windows, Mac, *nix)

Chapter 12: Hardening Wireless

Chapter 13: Hardening a Mixed Unix Network

Chapter 14: Intrusion Detection and Response

Chapter 15: Managing Malicious Code

Chapter 16: Hardening Wetware

Part III: Once is Never Enough

Chapter 17: Auditing and Testing Security

Chapter 18: Change Management

Chapter 19: Security Patching

Chapter 20: Security Review

Part IV: How to Succeed at Hardening

Chapter 21: Politics of Security Management

Chapter 22: Security Agnostics