Cargando…

Endpoint security /

A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kadrich, Mark
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn123904784
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 070501s2007 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d BAKER  |d TXJ  |d CEF  |d C6I  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d OCLCQ  |d YDX  |d OCLCA  |d WYU  |d UAB  |d VT2  |d RDF  |d OCLCO  |d OCLCQ 
019 |a 1064203606  |a 1103279632  |a 1129356640 
020 |a 9780321436955 
020 |a 0321436954 
029 1 |a AU@  |b 000067113680 
029 1 |a CHBIS  |b 006147096 
029 1 |a CHVBK  |b 171184718 
029 1 |a DEBSZ  |b 355404095 
035 |a (OCoLC)123904784  |z (OCoLC)1064203606  |z (OCoLC)1103279632  |z (OCoLC)1129356640 
037 |a CL0500000009  |b Safari Books Online 
050 4 |a TK5105.59  |b .K33 2007 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Kadrich, Mark. 
245 1 0 |a Endpoint security /  |c by Mark S. Kadrich. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 |a A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: - Recognize dangerous limitations in conventional endpoint security strategies - Identify the best products, tools, and processes to secure your specific devices and infrastructure - Configure new endpoints securely and reconfigure existing endpoints to optimize security - Rapidly identify and remediate compromised endpoint devices - Systematically defend against new endpoint-focused malware and viruses - Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defini ... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Kadrich, Mark.  |t Endpoint security.  |d Upper Saddle River, N.J. : Addison-Wesley, 2007  |w (DLC) 2006102875 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321436955/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38082102 
938 |a Baker & Taylor  |b BKTY  |c 54.99  |d 54.99  |i 0321436954  |n 0007040379  |s active 
938 |a YBP Library Services  |b YANK  |n 14858277 
994 |a 92  |b IZTAP