Cargando…

Mastering network security /

The Technology You Need is Out There. The Expertise You Need is in Here. Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technolo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Brenton, Chris
Otros Autores: Hunt, Cameron
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : Sybex, ©2003.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn560262467
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 020606s2003 caua o 001 0 eng d
010 |z  2002108077 
040 |a MERUC  |b eng  |e pn  |c MERUC  |d CCO  |d E7B  |d OCLCQ  |d NTG  |d FDAGB  |d TEFOD  |d YDXCP  |d IDEBK  |d UV0  |d DKDLA  |d N$T  |d UMI  |d OCLCQ  |d COO  |d N15  |d B24X7  |d OCLCQ  |d DEBSZ  |d OCLCF  |d OCLCQ  |d OTZ  |d OCLCQ  |d EBLCP  |d OCLCQ  |d AZK  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d BRL  |d STF  |d WRM  |d CEF  |d ICG  |d INT  |d NRAMU  |d VT2  |d AU@  |d OCLCQ  |d A6Q  |d OCLCQ  |d UAB  |d OCLCQ  |d VLY  |d UKAHL  |d UKCRE  |d CZL  |d BRF  |d EYM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 54940736  |a 55234216  |a 58782088  |a 62874507  |a 79475627  |a 228145045  |a 228145046  |a 488487781  |a 647610590  |a 745061767  |a 781258610  |a 888578025  |a 922973379  |a 927461033  |a 935261028  |a 961662714  |a 962573163  |a 988513241  |a 991989131  |a 1037438394  |a 1037736965  |a 1038702247  |a 1045526213  |a 1060200023  |a 1076326902  |a 1081258399  |a 1103250565  |a 1105715638  |a 1107329697  |a 1129336805  |a 1132917563  |a 1152990644  |a 1162416005  |a 1179658897  |a 1295596059 
020 |a 9780782151480  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 0782151485  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 9780782141429 
020 |a 0782141420 
020 |a 0585487529  |q (electronic bk.) 
020 |a 9780585487526  |q (electronic bk.) 
020 |z 0782141420 
020 |z 0782151485 
020 |a 9786610650057 
020 |a 6610650055 
029 1 |a AU@  |b 000043251097 
029 1 |a AU@  |b 000053023912 
029 1 |a AU@  |b 000053222756 
029 1 |a DEBBG  |b BV044121333 
029 1 |a DEBSZ  |b 368472167 
029 1 |a DEBSZ  |b 396098452 
029 1 |a DEBSZ  |b 449086216 
029 1 |a NZ1  |b 11773754 
029 1 |a NZ1  |b 12047148 
035 |a (OCoLC)560262467  |z (OCoLC)54940736  |z (OCoLC)55234216  |z (OCoLC)58782088  |z (OCoLC)62874507  |z (OCoLC)79475627  |z (OCoLC)228145045  |z (OCoLC)228145046  |z (OCoLC)488487781  |z (OCoLC)647610590  |z (OCoLC)745061767  |z (OCoLC)781258610  |z (OCoLC)888578025  |z (OCoLC)922973379  |z (OCoLC)927461033  |z (OCoLC)935261028  |z (OCoLC)961662714  |z (OCoLC)962573163  |z (OCoLC)988513241  |z (OCoLC)991989131  |z (OCoLC)1037438394  |z (OCoLC)1037736965  |z (OCoLC)1038702247  |z (OCoLC)1045526213  |z (OCoLC)1060200023  |z (OCoLC)1076326902  |z (OCoLC)1081258399  |z (OCoLC)1103250565  |z (OCoLC)1105715638  |z (OCoLC)1107329697  |z (OCoLC)1129336805  |z (OCoLC)1132917563  |z (OCoLC)1152990644  |z (OCoLC)1162416005  |z (OCoLC)1179658897  |z (OCoLC)1295596059 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b B757 2003eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 21 
049 |a UAMI 
100 1 |a Brenton, Chris. 
245 1 0 |a Mastering network security /  |c Chris Brenton, Cameron Hunt. 
250 |a 2nd ed. 
260 |a San Francisco :  |b Sybex,  |c ©2003. 
300 |a 1 online resource (xvi, 490 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a ""Acknowledgments""; ""Contents at a Glance""; ""Contents""; ""Introduction""; ""What This Book Covers""; ""Who Should Read This Book""; ""Chapter 1: A Systems Analysis Approach to Information Technology""; ""An Introduction to Systems Analysis""; ""Applying Systems Analysis to Information Technology""; ""Summary""; ""Chapter 2: Security as a Process""; ""Survival of the Fittest: The Myth of Total Security""; ""Risk Mitigation: Case Studies of Success and Failure""; ""The Systems Development Life Cycle (SDLC): Security as a Process from Beginning to End"" 
505 8 |a ""Steady As It Goes: Putting the “Constantâ€? Back into Vigilance""""Summary""; ""Chapter 3: Understanding How Network Systems Communicate""; ""The Anatomy of a Frame of Data""; ""A Protocolâ€?s Job""; ""The OSI Model""; ""Routers""; ""Connectionless and Connection-Oriented Communications""; ""Network Services""; ""Upper Layer Communications""; ""Summary""; ""Chapter 4: Topology Security""; ""Understanding Network Transmissions""; ""Topology Security""; ""Basic Networking Hardware""; ""Summary""; ""Chapter 5: Firewalls""; ""Defining an Access Control Policy""; ""Definition of a Firewall"" 
505 8 |a ""When Is a Firewall Required?""""Firewall Functions""; ""Firewall Types""; ""Which Firewall Functions Should I Use?""; ""Which Type Should I Choose?""; ""Additional Firewall Considerations""; ""Firewall Deployment""; ""Summary""; ""Chapter 6: Ciscoâ€?s PIX Firewall""; ""An Overview of PIX""; ""Installing PIX""; ""Configuring PIX""; ""Configuring PIX Security""; ""Summary""; ""Chapter 7: Intrusion Detection Systems""; ""IDS Types""; ""NIDS Limitations""; ""Host-Based IDS""; ""NIDS Fusion""; ""Snort: A Popular NIDS""; ""Summary""; ""Chapter 8: Authentication and Encryption"" 
505 8 |a ""The Need for Improved Security""""Good Authentication Required""; ""Encryption 101""; ""Good Encryption Required""; ""Solutions""; ""Summary""; ""Chapter 9: Virtual Private Networking""; ""VPN Basics""; ""Setting Up a VPN""; ""Summary""; ""Chapter 10: Viruses, Trojans, and Worms""; ""Viruses: The Statistics""; ""What Is a Virus?""; ""Worms""; ""Trojan Horses""; ""Preventive Measures""; ""Deploying Virus Protection""; ""Summary""; ""Chapter 11: Disaster Prevention and Recovery""; ""Disaster Categories""; ""Network Disasters""; ""Topology""; ""Server Disasters""; ""Extreme Disasters"" 
505 8 |a ""VERITAS Storage Replicator""""Summary""; ""Chapter 12: The Wide World of Windows""; ""NT Overview""; ""Active Directory""; ""The Domain Structure""; ""User Accounts""; ""The File System""; ""Logging""; ""Security Patches""; ""Available IP Services""; ""Packet Filtering with Windows NT""; ""Securing DCOM""; ""Ports Used by Windows Services""; ""Additional Registry Key Changes""; ""Windows 2000""; ""Windows .NET""; ""Summary""; ""Chapter 13: Unix-Based Systems""; ""Unix History""; ""The Unix File System""; ""Account Administration""; ""Optimizing the Unix Kernel"" 
520 |a The Technology You Need is Out There. The Expertise You Need is in Here. Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization's network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes: Understanding sec. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Hunt, Cameron. 
776 0 8 |i Print version:  |a Brenton, Chris.  |t Mastering network security.  |b 2nd ed.  |d San Francisco : Sybex, ©2003  |w (DLC) 2002108077 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780782141429/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH14585596 
938 |a Books 24x7  |b B247  |n bks00002570 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3056691 
938 |a ebrary  |b EBRY  |n ebr10149945 
938 |a EBSCOhost  |b EBSC  |n 92821 
938 |a YBP Library Services  |b YANK  |n 2336555 
938 |a YBP Library Services  |b YANK  |n 2593140 
994 |a 92  |b IZTAP