The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network defenses. It discusses perimeter components such as firewalls, VPNs, routers, and intrusion detection systems, and explains how to integrate them into a unified whole to meet real-world business requirements. The book consolidates the experience of seventeen information security professionals working together as a team of writers and reviewers. This is an excellent reference for those interested in examining best practices of perimeter defense and in expanding their knowledge of network security. Because the book was developed in close coordination with the SANS Institute, it is also a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Stephen Northcutt created the Shadow Intrusion Detection System, the DoD Shadow team, the GIAC Security Certification Series, and the SANS Immersion Security Training education system currently consisting of 11 tracks ranging from Security Essentials to Forensics. He authored, or teamed to write Incident Handling Step-by-Step, Network Intrusion Detection: An Analyst's Handbook, and Intrusion Signatures and Analysis. Before joining SANS, Stephen served as Chief for Information Warfare at the Ballistic Missile Defense Organization. Currently, he is an instructor for the SANS Institute.
Lenny Zeltser's work in information security draws upon experience in system administration, software architecture, and independent research. Lenny worked as a consultant to a major financial institution, co-founded a software company, and is presently a Director of Information Security at Kiodex, Inc. He has also written and presented coursework for SANS, reverse-engineered malicious software, and is an active member of several security GIAC certification advisory boards. Lenny holds a number of professional certifications such as MCSE, CCSE, GSEC, GCFW, GCIA, GCUX, and GCIH, and has earned a bachelor's degree in computer science engineering from the University of Pennsylvania.
Scott Winters has been working in all aspects of networking and computer security for 12 years. He has been an instructor, author, network engineer, consultant, and systems administrator and has worked with various perimeter security solutions, firewalls, and infrastructure designs. He has SANS GIAC GSEC, GCFW, and GCFW certifications, as well as MCSE, CNE, and Cisco CCNA and other technology certifications. Scott's other accomplishments include the authoring and editing of a SANS GIAC training and certification course and exam content. He has also been involved in the SANS GIAC mentoring program, and has served on the SANS GCFW Advisory Board.
Karen Kent Frederick is a senior security engineer for the Rapid Response Team at NFR Security. She holds a bachelor's degree in computer science from the University of Wisconsin-Parkside and a master's in computer science from the University of Idaho. Karen has more than 10 years of experience in various areas of IT, particularly system administration and information security. She holds four SANS GIAC certifications and also has the CCSA and MCSE + Internet certifications. Karen is one of the authors of Intrusion Signatures and Analysis (New Riders) and is a contributing author to the Handbook of Computer Crime Investigation (Academic Press). She also frequently writes on intrusion detection-related topics for SecurityFocus.com.
Ronald W. Ritchey is an authority in the areas of secure network design and network intrusion and regularly leads penetration testing efforts for Booz Allen Hamilton, where he has had the opportunity to learn first-hand the real-world impact of network vulnerabilities. He is also an active researcher in the field with peer-reviewed publications in the area of automated network security analysis. Ron holds a master's degree in computer science from George Mason University and is currently pursuing his Ph.D. in information technology at their School of Information Technology and Engineering. His doctoral research is attempting to automate network security analysis.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 3,99 für den Versand von Frankreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Ammareal, Morangis, Frankreich
Softcover. Zustand: Bon. Légères traces d'usure sur la couverture. Edition 2003. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Slight signs of wear on the cover. Edition 2003. Ammareal gives back up to 15% of this item's net price to charity organizations. Bestandsnummer des Verkäufers D-516-442
Anzahl: 1 verfügbar
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Very Good. 1st. Ships from the UK. Used book that is in excellent condition. May show signs of wear or have minor defects. Bestandsnummer des Verkäufers GRP102452707
Anzahl: 1 verfügbar
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Good. 1st. Ships from the UK. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers GRP94106349
Anzahl: 1 verfügbar
Anbieter: Bahamut Media, Reading, Vereinigtes Königreich
Zustand: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Bestandsnummer des Verkäufers 6545-9780735712324
Anzahl: 2 verfügbar
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
Zustand: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Bestandsnummer des Verkäufers 7719-9780735712324
Anzahl: 2 verfügbar
Anbieter: Godley Books, Hyde, Vereinigtes Königreich
Soft Cover. Zustand: Near Fine. Name/date to title page. No other marks or inscriptions. No creasing to covers or to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 678pp. A practical, comprehensive solution to defending your network perimeter. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9 x 7.5 inches. Bestandsnummer des Verkäufers 025430
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. 1st. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers GRP94106349
Anzahl: 2 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. 1st. Used book that is in excellent condition. May show signs of wear or have minor defects. Bestandsnummer des Verkäufers GRP102452707
Anzahl: 2 verfügbar
Anbieter: Better World Books: West, Reno, NV, USA
Zustand: Good. 1st. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers GRP92316364
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.64. Bestandsnummer des Verkäufers G0735712328I4N00
Anzahl: 1 verfügbar