Cargando…

Network security : a practical approach /

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Harrington, Jan L.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, �2005.
Colección:Morgan Kaufmann series in networking.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162129994
003 OCoLC
005 20231117014815.0
006 m o d
007 cr cn|||||||||
008 070802s2005 ne a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OKU  |d OCLCQ  |d N$T  |d YDXCP  |d IDEBK  |d CDN  |d E7B  |d MERUC  |d OCLCQ  |d OCLCF  |d NNO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d COO  |d AGLDB  |d OCLCQ  |d ESU  |d OCLCQ  |d STF  |d D6H  |d VTS  |d CEF  |d OCLCQ  |d ZCU  |d UKDOC  |d DEBSZ  |d AU@  |d WYU  |d LEAUB  |d M8D  |d OCLCQ  |d VLY  |d AJS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d OCLCO 
019 |a 76788862  |a 148724043  |a 276461538  |a 437172449  |a 475997866  |a 507352156  |a 647544477  |a 1035675169  |a 1125383067  |a 1162020954 
020 |a 9780123116338 
020 |a 0123116333 
020 |a 0080455379  |q (electronic bk.) 
020 |a 9780080455372  |q (electronic bk.) 
020 |a 1280633425 
020 |a 9781280633423 
020 |a 9786610633425 
020 |a 6610633428 
035 |a (OCoLC)162129994  |z (OCoLC)76788862  |z (OCoLC)148724043  |z (OCoLC)276461538  |z (OCoLC)437172449  |z (OCoLC)475997866  |z (OCoLC)507352156  |z (OCoLC)647544477  |z (OCoLC)1035675169  |z (OCoLC)1125383067  |z (OCoLC)1162020954 
050 4 |a TK5105.59  |b .H357 2005eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
100 1 |a Harrington, Jan L. 
245 1 0 |a Network security :  |b a practical approach /  |c Jan L. Harrington. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier :  |b Morgan Kaufmann Publishers,  |c �2005. 
300 |a 1 online resource (xv, 365 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The Morgan Kaufmann Series in Networking 
504 |a Includes bibliographical references (pages 344-345) and index. 
505 0 |a In the beginning -- Basic security architecture -- Physical security -- Information gathering -- Gaining and keeping root access -- Spoofing -- Denial of service attacks -- Malware -- User and password security -- Remote access -- Wireless security -- Encryption. 
520 |a Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates 
588 0 |a Print version record. 
546 |a English. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 1 7 |a Computernetwerken.  |2 gtt 
650 1 7 |a Computerbeveiliging.  |2 gtt 
776 0 8 |i Print version:  |a Harrington, Jan L.  |t Network security.  |d Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, �2005  |z 0123116333  |z 9780123116338  |w (DLC) 2005040077  |w (OCoLC)58546394 
830 0 |a Morgan Kaufmann series in networking. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780123116338  |z Texto completo