Cargando…

How to cheat at securing your network /

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Dubrawsky, Ido
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2007.
Colección:"How to cheat--"
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn233541332
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 080707s2007 maua o 001 0 eng d
010 |z  2007281938 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d OSU  |d IDEBK  |d E7B  |d OCLCQ  |d EBLCP  |d OCLCO  |d OCLCQ  |d OPELS  |d DKDLA  |d UMI  |d DEBSZ  |d OCLCQ  |d OCLCF  |d YDXCP  |d OCLCQ  |d COO  |d OCLCQ  |d AGLDB  |d MERUC  |d OCLCQ  |d OCLCA  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d JBG  |d STF  |d LEAUB  |d OCLCQ  |d K6U  |d VT2  |d UAB  |d OCLCO  |d OCLCQ  |d M8D  |d OCLCO  |d SGP  |d OCLCQ  |d INARC 
015 |a GBA798129  |2 bnb 
016 7 |a 014459233  |2 Uk 
019 |a 247002660  |a 281598267  |a 475596753  |a 646747316  |a 844973193  |a 1065697239  |a 1156387673  |a 1192343989  |a 1240516715  |a 1256374116  |a 1393051818 
020 |a 9780080558646  |q (electronic bk.) 
020 |a 008055864X  |q (electronic bk.) 
020 |a 9781597492317 
020 |a 1597492310 
029 1 |a AU@  |b 000051562432 
029 1 |a AU@  |b 000052281739 
029 1 |a AU@  |b 000060058446 
029 1 |a CHBIS  |b 006041597 
029 1 |a CHNEW  |b 001007635 
029 1 |a CHVBK  |b 199630437 
029 1 |a DEBBG  |b BV041430541 
029 1 |a DEBBG  |b BV042305731 
029 1 |a DEBBG  |b BV043045182 
029 1 |a DEBSZ  |b 398263310 
029 1 |a DEBSZ  |b 407380426 
029 1 |a DEBSZ  |b 422125652 
029 1 |a DEBSZ  |b 430484895 
029 1 |a DEBSZ  |b 434147621 
029 1 |a GBVCP  |b 785368523 
029 1 |a NZ1  |b 13068874 
029 1 |a NZ1  |b 15189671 
029 1 |a DKDLA  |b 820120-katalog:9910110289505765 
035 |a (OCoLC)233541332  |z (OCoLC)247002660  |z (OCoLC)281598267  |z (OCoLC)475596753  |z (OCoLC)646747316  |z (OCoLC)844973193  |z (OCoLC)1065697239  |z (OCoLC)1156387673  |z (OCoLC)1192343989  |z (OCoLC)1240516715  |z (OCoLC)1256374116  |z (OCoLC)1393051818 
037 |a 149142:149294  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .H684 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a How to cheat at securing your network /  |c [Ido Dubrawksy, technical editor]. 
246 3 0 |a Securing your network 
260 |a Burlington, MA :  |b Syngress,  |c ©2007. 
300 |a 1 online resource (xix, 409 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a "How to cheat--" 
588 0 |a Print version record. 
520 8 |a Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit 
520 8 |a Printbegrænsninger: Der kan printes kapitelvis. 
505 0 |a Front Cover; How to Cheat at Securing Your Network; Copyright Page; Contents; Chapter 1. General Security Concepts: Access Control, Authentication, and Auditing; Introduction to AAA; Access Control; Authentication; Auditing; Disabling Non-essential Services, Protocols, Systems and Processes; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. General Security Concepts: Attacks; Attacks; Active Attacks; Social Engineering; Vulnerability Scanning; Passive Attacks; Password Attacks; Malicious Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions 
505 8 |a Chapter 3. Communication Security: Remote Access and MessagingIntroduction; The Need for Communication Security; Remote Access Security; E-mail Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Communication Security: Wireless; Introduction; Wireless Concepts; Wireless Vulnerabilities; Site Surveys; Implementing Wireless Security: Common Best Practices; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Communication Security: Web Based Services; Introduction; Web Security; FTP Security; Directory Services and LDAP Security; Summary 
505 8 |a Solutions Fast TrackFrequently Asked Questions; Chapter 6. Infrastructure Security: Devices and Media; Introduction; Device-based Security; Media-based Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Topologies and IDS; Introduction; Security Topologies; Intrusion Detection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Infrastructure Security: System Hardening; Introduction; Concepts and Processes of OS and NOS Hardening; Network Hardening; Application Hardening; Summary; Solutions Fast Track; Frequently Asked Questions 
505 8 |a Chapter 9. Basics of CryptographyIntroduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Public Key Infrastructure; Introduction; PKI; Key Management and Certificate Lifecycle; Summary; Solutions Fast Track; Frequently Asked Questions; Index 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Dubrawsky, Ido. 
776 0 8 |i Print version:  |t How to cheat at securing your network.  |d Burlington, MA : Syngress, ©2007  |z 9781597492317  |z 1597492310  |w (DLC) 2007281938  |w (OCoLC)176924797 
830 0 |a "How to cheat--" 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492317/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL338929 
938 |a ebrary  |b EBRY  |n ebr10229394 
938 |a EBSCOhost  |b EBSC  |n 227543 
938 |a YBP Library Services  |b YANK  |n 2864079 
938 |a Internet Archive  |b INAR  |n isbn_9781597492317 
994 |a 92  |b IZTAP