買這商品的人也買了...
-
$2,000$1,900 -
$1,340$1,273 -
$480$408 -
$1,890$1,796 -
$1,890$1,796 -
$970Introduction to Algorithms, 2/e
-
$350$277 -
$1,890$1,796 -
$2,210$2,100 -
$1,890$1,796 -
$399Visual C++ .NET: A Primer for C++ Developers (Paperback)
-
$880$695 -
$1,890$1,796 -
$1,580$1,501 -
$1,860$1,767 -
$1,650$1,568 -
$490$417 -
$280$266 -
$720$569 -
$750$675 -
$490$417 -
$450$383 -
$1,110$1,055 -
$680$612 -
$650Guide to Wireless Network Security (Hardcover) (書況較舊,書側有霉斑)
相關主題
商品描述
Expertise is what makes hackers effective. It's what will make you
effective, too, as you fight to keep them at bay. Mastering Network
Security has been fully updated to reflect the latest developments in
security technology, but it does much more than bring you up to date. More
importantly, it gives you a comprehensive understanding of the threats to your
organization's network and teaches you a systematic approach in which you make
optimal use of the technologies available to you. Coverage includes:
- Understanding security from a topological perspective
- Configuring Cisco router security features
- Selecting and configuring a firewall
- Configuring Cisco's PIX firewall
- Configuring an intrusion detection system
- Providing data redundancy
- Configuring a Virtual Private Network
- Securing your wireless network
- Implementing authentication and encryption solutions
- Recognizing hacker attacks
- Detecting and eradicating viruses
- Getting up-to-date security information
- Locking down Windows NT/2000/XP servers
- Securing UNIX, Linux, and FreBSD systems
Contents
Introduction
Chapter 1 • A Systems Analysis Approach to
Information Technology
Chapter 2 • Security as a Process
Chapter 3 •
Understanding How Network Systems Communicate
Chapter 4 • Topology
Security
Chapter 5 • Firewalls
Chapter 6 • Cisco's PIX Firewall
Chapter
7 • Intrusion Detection Systems
Chapter 8 • Authentication and
Encryption
Chapter 9 • Virtual Private Networking
Chapter 10 • Viruses,
Trojans, and Worms
Chapter 11 • Disaster Prevention and Recovery
Chapter
12 • The Wide World of Windows
Chapter 13 • Unix-Based Systems
Chapter 14
• The Anatomy of an Attack
Chapter 15 • Security Resources
Appendix A •
Operating System Security Checklists
Appendix B • Sample Network Usage
Policy
Index