HackNotes Network Security Portable Reference - Softcover

Horton, Michael; Mugge, Clinton

 
9780072227833: HackNotes Network Security Portable Reference

Inhaltsangabe

Here’s the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architecture solutions. Plus, learn to use a full complement of effective, up-to-date security tools.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorinnen und Autoren

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

Von der hinteren Coverseite

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code level techniques. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.

  • Use information security and risk assessment principles
  • Guard against common network threats and vulnerabilities
  • Understand hacker tactics and methods seen on the Internet and intranet
  • Protect common hacker and criminal targets
  • Conduct best practice security checks and hardening steps for your systems
  • Implement wireless security, Web application security, incident response, and more
  • Reference operating system and security specific commands
  • Access and utilize the best security and hacker tools in use today
  • Focus on the techniques, results, and remediation for a wide range of exploits
  • Protect networks, software code, e-commerce, and more

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.