Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Autor Chris Chapmanen Limba Engleză Paperback – 8 mar 2016
The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.
Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
- Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested
- Focuses on practical, real world implementation and testing
- Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing
- Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration
- Provides analysis in addition to step by step methodologies
Preț: 398.91 lei
Preț vechi: 498.63 lei
-20% Nou
Puncte Express: 598
Preț estimativ în valută:
76.34€ • 79.30$ • 63.41£
76.34€ • 79.30$ • 63.41£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128035849
ISBN-10: 0128035846
Pagini: 380
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.65 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128035846
Pagini: 380
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.65 kg
Editura: ELSEVIER SCIENCE
Cuprins
Introduction: Practical Security and Performance Testing
Ch. 1: Getting organized: Asset Inventory; knowing what you have
Ch. 2: Locking down Access: Internet, Wi-Fi, Wired Zones, and VPN
Ch. 3: Securing BYOD device access
Ch. 4: Hardening the Server
Ch. 5: Internal Security Threats and defending assets and zones
Ch. 6: How to test the Firewall and IPS/IDS Effectively
Ch. 7: Security Device Deployment Patterns
Ch. 8: Continuous Testing
Ch. 9: Defending against penetration attacks
Ch. 10: How to write and test a Request for Proposal
Ch. 11: Security "Fire drills"
Glossary
Ch. 1: Getting organized: Asset Inventory; knowing what you have
Ch. 2: Locking down Access: Internet, Wi-Fi, Wired Zones, and VPN
Ch. 3: Securing BYOD device access
Ch. 4: Hardening the Server
Ch. 5: Internal Security Threats and defending assets and zones
Ch. 6: How to test the Firewall and IPS/IDS Effectively
Ch. 7: Security Device Deployment Patterns
Ch. 8: Continuous Testing
Ch. 9: Defending against penetration attacks
Ch. 10: How to write and test a Request for Proposal
Ch. 11: Security "Fire drills"
Glossary