This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
About the Author
- Teachers you how to implement best of breed security using tools for free
- Ideal for anyone recomending and implementing new technologies within the company
- Companion Web site contains dozens of working scripts and tools
Eric S. Seagren (CISA, CISSP-ISSAP, SCNP, CCNA, CNE-4, MCP+I, MCSE-NT) has 10 years of experience in the computer industry, with the last eight years spent in the financial services industry working for a Fortune 100 company. Eric started his computer career working on Novell servers and performing general network troubleshooting for a small Houston-based company. Since he has been working in the financial services industry, his position and responsibilities have advanced steadily. His duties have included server administration, disaster recovery responsibilities, business continuity coordinator,Y2K remediation, network vulnerability assessment, and risk management responsibilities. He has spent the last few years as an IT architect and risk analyst, designing and evaluating secure, scalable, and redundant networks.
Eric has worked on several books as a contributing author or technical editor.These include Hardening Network Security (McGraw-Hill), Hardening Network Infrastructure (McGraw-Hill), Hacking Exposed: Cisco Networks (McGraw-Hill), Configuring Check Point NGX VPN-1/FireWall-1 (Syngress), Firewall Fundamentals (Cisco Press), and Designing and Building Enterprise DMZs (Syngress). He has also received a CTM from Toastmasters of America.
Americans at Work: A Cultural Guide to the Can-Do People Whether you work with Americans face-to-face, communicate with them via telephone or e-mail, or interact together in a virtual team, this book reveals the subtle and not-so-subtle aspects of American culture in the workplace.
Best-selling author Craig Storti provides historical perspectives and explanations of the six most important...
Pro Android 3
Computing continues to become more and more personalized and accessible. Handheld
devices have largely transformed into computing platforms. Mobile phones are no longer
just for talking—they have been capable of carrying data and video for some time. Be it
a phone or a tablet, the mobile device is now so capable of general-purpose...
Logic Programming and Nonmonotonic Reasoning: 9th International Conference, LPNMR 2007, Tempe, AZ, USA, May 15-17, 2007 This book constitutes the refereed proceedings of the 9th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2007, held in Tempe, AZ, USA in May 2007.
The 18 revised full papers, 5 revised poster papers, and 7 system descriptions presented together with 2 invited papers were carefully reviewed and selected for...
Nutrition: A Handbook for Community Nurses
This book has been written to provide community nurses with basic and topical practical information on various aspects of nutrition, to help in the provision of comprehensive dietary advice and information. It discusses healthy eating and nutrition and includes an overview of the current healthy eating guidelines, dietary reference values and...
Database Programming with JDBC and Java
Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust model for writing...