Network Perimeter Security: Building Defense In-Depth
Autor Cliff Riggsen Limba Engleză Hardback – 27 oct 2003
Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process.
Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 329.68 lei 6-8 săpt. | |
CRC Press – 19 sep 2019 | 329.68 lei 6-8 săpt. | |
Hardback (1) | 673.96 lei 6-8 săpt. | |
CRC Press – 27 oct 2003 | 673.96 lei 6-8 săpt. |
Preț: 673.96 lei
Preț vechi: 982.68 lei
-31% Nou
Puncte Express: 1011
Preț estimativ în valută:
128.99€ • 136.08$ • 107.49£
128.99€ • 136.08$ • 107.49£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849316289
ISBN-10: 0849316286
Pagini: 420
Ilustrații: 2 Tables, black and white; 66 Illustrations, black and white
Dimensiuni: 156 x 234 x 26 mm
Greutate: 0.75 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849316286
Pagini: 420
Ilustrații: 2 Tables, black and white; 66 Illustrations, black and white
Dimensiuni: 156 x 234 x 26 mm
Greutate: 0.75 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Preface. Managing Network Security. The Network Stack and Security. Cryptography and VPN Terminology. Application Security Needs. Access Control. The Public Key Infrastructure. Firewalls. Intrusion Detection Systems. Virtual Private Networks. Wireless Network Security. Network Penetration Testing. Incident Response. Disaster Recovery and Continuity Planning. Acceptable Use Policies. The Final Word.
Descriere
This text reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and create a budget based upon that policy. It assists them in designing the security model and outlines the testing process. Through the concepts and case studies presented in this book, they will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection systems, and other security tools and network components. This detailed volume enables readers to secure their networks on time, within budget, and without having to attain a security certification.