
Résumé
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process. Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.
L'auteur - Cliff Riggs
Cliff's areas of technical expertise include TCP/IP, LANs, routing and switching, security, e-commerce, and VPNs. At the same time, he is a Cisco Certified Network Professional, Cisco Certified Design Professional, Certified Novell Administrator, Citrix Certified Administrator, Microsoft Certified Professional + Internet and Microsoft Certified Trainer. Cliff is currently a Member of Technical Staff for Hill Associates. He holds an M.Ed. from Johnson State College and is a member of the IEEE and ICANN. Cliff has authored articles on IP addressing, BGPv4, IP Multicasting, IP QoS, and MPLS.
Sommaire
- Introduction
- Managing network security
- The network stack and security
- Cryptography and VPN terminology
- Application security needs
- Access control
- The public key infrastructure
- Firewalls
- Intrusion detection systems
- Virtual private networks
- Wireless network security
- Network penetration testing
- Incident response
- Disaster recovery and continuity planning
- Acceptable use policies
- The final word
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Auerbach |
Auteur(s) | Cliff Riggs |
Parution | 31/12/2003 |
Nb. de pages | 410 |
Format | 16,5 x 24,5 |
Couverture | Relié |
Poids | 740g |
Intérieur | Noir et Blanc |
EAN13 | 9780849316289 |
ISBN13 | 978-0-8493-1628-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Cryptographie
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet