Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)

Buy
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.

You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures.

Features
+ Helps you see through a hackers eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, malware, and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

About the Author

Jan L. Harrington, the author of 30 books, including SQL, Clearly Explained (Academic Press), has been writing about databases since 1984. She is a professor and chair of the department of computer science and information systems at Marist College, where she teaches database design and management, object-oriented programming, data communications, and computer architecture.

(HTML tags aren't allowed.)

Web Services Patterns: Java Edition
Web Services Patterns: Java Edition

Web Service Patterns: Java Edition describes architectural patterns that can guide you through design patterns (service implementation and usage) and illustrates the different ways in which you can use web services.

Author Paul Monday had two primary goals in writing this book: to show some interesting design patterns that...

Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Get a data mining recipe for success to increase profits and reduce costs in today’s business world with–This book shows you how to create and implement models of the most commonly asked data mining questions for marketing, sales, risk analysis, and customer relationship management and support. You’ll get proven modeling...

The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
NOW A NEW YORK TIMES, WASHINGTON POSTWALL STREET JOURNAL, USA TODAY, AND PUBLISHERS WEEKLY BESTSELLER.

There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His
...
Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy