Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Security Field Guide

Buy
Web Security Field Guide, 9781587050923 (1587050927), Cisco Press, 2002
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient levels of security without constraining performance or scalability. The more reliant organizations become on the Internet to perform daily jobs or conduct transactions, the greater the impact a breach of network security has. Just as Cisco Systems has been an innovator in using the Internet to conduct business, so too is it a market leader in the development and sale of products and technologies that protect data traveling across the Internet. Yet a network security solution is only as strong as its weakest link. Network attacks can occur at any point, including the network connection, the firewall, the web server, or the client. Hardening the defenses at all these points is key to creating an effective, all-encompassing network security solution.

Web Security Field Guide provides you with hands-on, proven solutions to help patch the most common vulnerabilities of Windows(r) web servers and browsers within the context of an end-to-end network security architecture. Avoiding conceptual discussions of underlying technologies, the book spends little time discussing how each application works. Using plain language and lots of step-by-step examples, the book instead focuses on helping you secure your web servers and prevent the majority of network attacks. Divided into five parts, the book opens with an overview of essential background information and helps you establish working network security rules and policies. Parts II through IV teach you the techniques for hardening the operating system, the web server, and the browser. Part V of the book addresses overall network security, focusing on preventing and controlling access. Topics such as becoming a Certification Authority, Cisco PIX(r) Firewall, Cisco IOS(r) Firewall, access lists, ongoing security maintenance, and testing are all examined in-depth, providing an overall network security plan that can drastically reduce the risk to your business systems and data.

Full of diagrams, screen captures, and step-by-step instructions for performing simple tasks that can radically improve the security of your Internet business solutions, Web Security Field Guide is a practical tool that can help ensure the integrity and security of your business-critical applications.

About the Author

Steve Kalman, CISSP, is the managing director for Esquire Micro Consultants, through which he teaches eight courses on Cisco routers, Microsoft(r) Windows, and networking, telecom, and security topics for Learning Tree International. He is also the technical editor for three of those courses. Steve has also developed or edited more than a dozen CBT modules on networking, Cisco routers, and Microsoft Windows topics. In addition to teaching and course development, Steve is a network design consultant. Steve has worked as a programmer, manager, and consultant for companies of all sizes, both for-profit and nonprofit.

(HTML tags aren't allowed.)

Disarming Strangers
Disarming Strangers

In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic...

Running Microsoft(r) Windows(r) 2000 Professional
Running Microsoft(r) Windows(r) 2000 Professional
With Windows 2000 Professional, Microsoft delivers its most powerful and intuitive user experience to date. And with RUNNING MICROSOFT WINDOWS 2000 PROFESSIONAL, users at all levels of Windows fluency get the answers they need to put this new platform to work-direct from Microsoft's own publishing division. This one-stop reference offers the most...
Getting Started with iPhone SDK, Android and others
Getting Started with iPhone SDK, Android and others

This book covers the known relative differences between the most popular mobile platform development options for handheld devices such as personal digital assistants, enterprise digital assistants or mobile phones.

It helps guide developers in choosing a mobile platform for development on Information appliances, and covers iPhone...


Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
There is no more authoritative pair of authors on Querying XML than Jim Melton and Stephen Buxton. Best of all, as readers of Jim's other books know, his informal writing style will teach you what you need to know about this complex subject without giving you a headache. If you need a comprehensive and accessible overview of Querying XML, this...
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R

Get command of your organizational Big Data using the power of data science and analytics

Key Features

  • A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisions
  • Work with the best tools such as Apache...
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)

Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy