Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
Features
+ Helps you see through a hacker s eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, malware,? and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
About the Author
Jan L. Harrington, the author of more than 30 books, has been writing about computers since 1984. She has been involved with the Internet and the administration of Internet servers since the mid-1980s, when she first operated an Internet-connected AT&T 3B2. Dr. Harrington is a full-time faculty member and chair of the Department of Computer Science and Information Systems at Marist College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.|Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
Features
+ Helps you see through a hacker s eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, malware, and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
About the Author
Jan L. Harrington, the author of more than 30 books, has been writing about computers since 1984. She has been involved with the Internet and the administration of Internet servers since the mid-1980s, when she first operated an Internet-connected AT&T 3B2. Dr. Harrington is a full-time faculty member and chair of the Department of Computer Science and Information Systems at Marist College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Better World Books: West, Reno, NV, USA
Zustand: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Bestandsnummer des Verkäufers GRP62228799
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 384. Bestandsnummer des Verkäufers 26652060
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 384 Illus. Bestandsnummer des Verkäufers 8277187
Anzahl: 1 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. pp. 384. Bestandsnummer des Verkäufers 18652054
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Zustand: new. Bestandsnummer des Verkäufers 57N44_74_0123116333
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Bestandsnummer des Verkäufers ABEOCT25-56045
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Bestandsnummer des Verkäufers ABNR-289741
Anbieter: SMASS Sellers, IRVING, TX, USA
Zustand: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed. Bestandsnummer des Verkäufers ASNT3-289741
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Bestandsnummer des Verkäufers ABNR-220995
Anbieter: SMASS Sellers, IRVING, TX, USA
Zustand: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed. Bestandsnummer des Verkäufers ASNT3-220995