Hardening Network Security
John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric S. Seagren, Paul Love, Rob Kraft, Mark O'Neill, Robert McMullin
- 出版商: McGraw-Hill Education
- 出版日期: 2004-12-01
- 售價: $1,860
- 貴賓價: 9.5 折 $1,767
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 0072257032
- ISBN-13: 9780072257038
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$2,145$2,038 -
$450$356 -
$750$675 -
$560$504 -
$980$774 -
$850$723 -
$780$616 -
$490$382 -
$620$490 -
$2,500$2,375 -
$650$507 -
$650$514 -
$450$405 -
$520$406 -
$580$458 -
$590$460 -
$590$460 -
$580$452 -
$1,596$1,512 -
$2,140$2,033 -
$1,320TSP-Leading a Development Team
-
$2,475$2,351 -
$750$585 -
$580$493 -
$650$553
相關主題
商品描述
Description:
Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.
Features a four-part hardening methodology:
- Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack
- Take It From The Top--Systematic approach to hardening your enterprise from the top down
- Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing
- How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program
Table of Contents:
Part I: Do This Now!
Chapter 1: Do These 7 Things Before You Do Anything Else
Part II: Take it From the Top. Systematically Hardening Your Enterprise
Chapter 2: Break the Network into Areas of Common Functionality
Chapter 3: Hardening with Identity Management Systems
Chapter 4: Hardening Cross Platform Authentication
Chapter 5: Implement Secure Centralized Authentication Mechanisms
Chapter 6: Mobile Authentication Considerations
Chapter 7: Beyond Access Controls - Protecting Stored Data
Chapter 8: Hardening Database Access
Chapter 9: Hardening Cross Platform Access Controls
Chapter 10: Hardening Data Transport Using Encryption
Chapter 11: Hardening Remote Clients (Windows, Mac, *nix)
Chapter 12: Hardening Wireless
Chapter 13: Hardening a Mixed Unix Network
Chapter 14: Intrusion Detection and Response
Chapter 15: Managing Malicious Code
Chapter 16: Hardening Wetware
Part III: Once is Never Enough
Chapter 17: Auditing and Testing Security
Chapter 18: Change Management
Chapter 19: Security Patching
Chapter 20: Security Review
Part IV: How to Succeed at Hardening
Chapter 21: Politics of Security Management
Chapter 22: Security Agnostics
商品描述(中文翻譯)
描述:
採取主動的方式來實施預防措施,以防止攻擊發生。本書由一群安全專家撰寫,提供了立即可行的具體步驟,以及確保長期安全性的持續行動。詳細了解如何從基礎開始系統性地加固您的網絡,以及獲得公司整體支持您的安全計劃的策略。
特點:
具有四部分加固方法:
- 立即採取行動!- 檢查清單,立即採取進一步鎖定系統的步驟
- 從頂層開始- 系統性地加固您的企業
- 一次永不足夠!- 持續監控和評估計劃,以保持網絡的安全性,包括補丁管理和審計
- 如何成功- 為您的安全計劃獲得預算批准、管理層支持和員工合作的策略
目錄:
第一部分:立即採取行動!
第1章:在進行任何其他操作之前,請完成以下7個步驟
第二部分:從頂層開始。系統性地加固您的企業
第2章:將網絡分為具有共同功能的區域
第3章:使用身份管理系統進行加固
第4章:加固跨平台身份驗證
第5章:實施安全的集中式身份驗證機制
第6章:移動身份驗證考慮事項
第7章:超越存取控制- 保護存儲的數據
第8章:加固數據庫訪問
第9章:加固跨平台存取控制
第10章:使用加密加固數據傳輸
第11章:加固遠程客戶端(Windows、Mac、*nix)
第12章:加固無線網絡
第13章:加固混合Unix網絡
第14章:入侵檢測和響應
第15章:管理惡意代碼
第16章:加固人為因素
第三部分:一次永不足夠
第17章:審計和測試安全性
第18章:變更管理
第19章:安全補丁
第20章:安全審查
第四部分:如何成功加固
第21章:安全管理的政治
第22章:安全不可知論者