Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or minimize them. Covers all major network operating systems -- NT, NetWare, and Unix -- and all aspects of network security, from physical security of premises and equipment to anti-hacker countermeasures to setting up your own Virtual Private Networks. The CD includes evaluation and demonstration versions of commercial firewalls, intrusion detection software, and a complete security policy.
The Technology You Need is Out There. The Expertise You Need is in Here.
Expertise is what makes hackers effective. It’s what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization’s network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes:
About the Author
- Understanding security from a topological perspective
- Configuring Cisco router security features
- Selecting and configuring a firewall
- Configuring Cisco’s PIX firewall
- Configuring an intrusion detection system
- Providing data redundancy
- Configuring a Virtual Private Network
- Securing your wireless network
- Implementing authentication and encryption solutions
- Recognizing hacker attacks
- Detecting and eradicating viruses
- Getting up-to-date security information
- Locking down Windows NT/2000/XP servers
- Securing UNIX, Linux, and FreBSD systems
Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques
of quantum cryptography, including secret-key distillation, as well as some
more advanced topics. As quantum cryptography is now becoming a practical
reality with products available commercially, it is important to focus not
only on the theory of quantum... Windows 8: The Missing Manual
With Windows 8, Microsoft completely reimagined the graphical user interface for its operating system, and designed it to run on tablets as well as PCs. It’s a big change that calls for a trustworthy guide—Windows 8: The Missing Manual. New York Times columnist David Pogue provides technical insight, lots of...
Oracle Performance Tuning and Optimization
Database management software and the manipulation of data has evolved to where it touches every aspect of our lives. A day doesn’t go by in which we don’t access a database. Whether we are withdrawing money from an ATM machine, opening a checking account, or purchasing groceries, every aspect of our lives is affected by...
Pro Tools 10 for Game Audio
With a basic understanding of Pro Tools, and the information in this book, you will be on your way to joining the exciting world of producing game audio. PRO TOOLS 10 FOR GAME AUDIO covers the world of Pro Tools audio production in the gaming environment. In this book, you will be guided, step-by-step, through eight different components of...
Micro-Nanorobotic Manipulation Systems and Their Applications
Micro/Nano Robotics and Automation technologies have rapidly grown associated with the growth of Micro and Nanotechnologies. This book presents a summary of fundamentals in micro-nano scale engineering and the current state of the art of these technologies.
“Micro-Nanorobotic Manipulation Systems and their Applications”...