My Account Log in

1 option

Mastering network security / Chris Brenton, Cameron Hunt.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Brenton, Chris.
Contributor:
Hunt, Cameron.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (508 p.)
Edition:
2nd ed.
Place of Publication:
San Francisco : Sybex, c2003.
Language Note:
English
System Details:
text file
Summary:
The Technology You Need is Out There. The Expertise You Need is in Here. Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization's network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes:
Contents:
Mastering Network Security Second Edition; Acknowledgments; Contents at a Glance; Contents; Introduction; What This Book Covers; Who Should Read This Book; Chapter 1: A Systems Analysis Approach to Information Technology; An Introduction to Systems Analysis; Applying Systems Analysis to Information Technology; Summary; Chapter 2: Security as a Process; Survival of the Fittest: The Myth of Total Security; Risk Mitigation: Case Studies of Success and Failure; The Systems Development Life Cycle (SDLC): Security as a Process from Beginning to End
Steady As It Goes: Putting the "Constant" Back into Vigilance Summary; Chapter 3: Understanding How Network Systems Communicate; The Anatomy of a Frame of Data; A Protocol's Job; The OSI Model; Routers; Connectionless and Connection-Oriented Communications; Network Services; Upper Layer Communications; Summary; Chapter 4: Topology Security; Understanding Network Transmissions; Topology Security; Basic Networking Hardware; Summary; Chapter 5: Firewalls; Defining an Access Control Policy; Definition of a Firewall; When Is a Firewall Required?; Firewall Functions; Firewall Types
Which Firewall Functions Should I Use?Which Type Should I Choose?; Additional Firewall Considerations; Firewall Deployment; Summary; Chapter 6: Cisco's PIX Firewall; An Overview of PIX; Installing PIX; Configuring PIX; Configuring PIX Security; Summary; Chapter 7: Intrusion Detection Systems; IDS Types; NIDS Limitations; Host-Based IDS; NIDS Fusion; Snort: A Popular NIDS; Summary; Chapter 8: Authentication and Encryption; The Need for Improved Security; Good Authentication Required; Encryption 101; Good Encryption Required; Solutions; Summary; Chapter 9: Virtual Private Networking; VPN Basics
Setting Up a VPN Summary; Chapter 10: Viruses, Trojans, and Worms; Viruses: The Statistics; What Is a Virus?; Worms; Trojan Horses; Preventive Measures; Deploying Virus Protection; Summary; Chapter 11: Disaster Prevention and Recovery; Disaster Categories; Network Disasters; Topology; Server Disasters; Extreme Disasters; VERITAS Storage Replicator; Summary; Chapter 12: The Wide World of Windows; NT Overview; Active Directory; The Domain Structure; User Accounts; The File System; Logging; Security Patches; Available IP Services; Packet Filtering with Windows NT; Securing DCOM
Ports Used by Windows Services Additional Registry Key Changes; Windows 2000; Windows .NET; Summary; Chapter 13: Unix-Based Systems; Unix History; The Unix File System; Account Administration; Optimizing the Unix Kernel; IP Service Administration; Unix Checklist Overview; Summary; Chapter 14: The Anatomy of an Attack; Collecting Information; Probing the Network; Launching the Attack; Summary; Chapter 15: Security Resources; Information from the Vendor; Third-Party Channels; Summary; Appendix A: Operating System Security Checklists; Windows 2000 Server Security Checklist
Linux Security Checklist
Notes:
Includes index.
ISBN:
9786610650057
9780585487526
0585487529
9780782151480
0782151485
OCLC:
560262467

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account