Résumé
Network security: fast & fun?
If you think a background in computer science is necessary for understanding information security, think again.
Network Security Illustrated explores information security using a simple, powerful methodology and captivating illustrations. This highly accessible approach makes learning how to protect valuable data and computer systems fast and fun.
BONUS: The enclosed wall poster reinforces every major security concept and relationship via intuitive illustrations.
Do you want to better understand how computer security impacts your business?
Organized around common business problems instead of technology, this easily navigable, illustrated reference will help you:
- Understand major security concepts and solutions
- Identify limitations and risks in security strategies
- Select and implement solutions that are right for your needs
Perfect for all managers who make business decisions about security and need to get up to speed on security concepts, Network Security Illustrated is equally beneficial to network administrators, security specialists, and solutions developers.
Learn how to:
- Manage and Outsource Security
- Identify and Authenticate Users
- Protect a Network's Infrastructure
- Store, Hide, and Access Information Securely
- Detect Intrusions and Recover From Disasters
- And much, much more!
Contents
- Managing Security
- Managing Security: The Security Assessment
- Managing Security: Systems and Network Monitoring
- Outsourcing Options
- Outsourcing Options: Outsourcing Network Monitoring
- Outsourcing Options: Outsourcing Disaster Prevention
- Outsourcing Options: Outsourcing Proactive Security
- Reserving Rights
- Reserving Rights: Digital Rights Management
- Reserving Rights: Copy Protection
- Determining Identity
- Determining Identity: Passwords
- Determining Identity: Digital Certificates
- Determining Identity: Portable Identifiers
- Determining Identity: Biometrics
- Preserving Privacy
- Preserving Privacy: Anonymity
- Preserving Privacy: User Tracking
- Preserving Privacy: Spam Management
- Connecting Networks
- Connecting Networks: Networking Hardware
- Connecting Networks: Wireless Connections
- Connecting Networks: Network Lingo
- Hardening Networks
- Hardening Networks: Firewalls
- Hardening Networks: Network Address Translation
- Hardening Networks: Virtual Private Networks
- Hardening Networks: Traffic Shaping
- Storing Information
- Storing Information: Storage Media
- Storing Information: Local File Systems
- Storing Information: Network File Systems
- Storing Information: Databases
- Hiding Information
- Hiding Information: Cryptography
- Hiding Information: Cryptanalysis
- Hiding Information: Steganography
- Accessing Information
- Accessing Information: Client-Server Architecture
- Accessing Information: Internet Services
- Accessing Information: Remote Access
- Accessing Information: Peer-to-Peer Networking
- Ensuring Availability
- Ensuring Availability: RAID
- Ensuring Availability: Clustering
- Ensuring Availability: Backup Systems
- Detecting Intrusions
- Detecting Intrusions: File Integrity
- Detecting Intrusions: Viruses and Trojans
- Detecting Intrusions: Network Scanners
- Detecting Intrusions: Network Sniffers
- Detecting Intrusions: Logging and Analysis
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Jason Albanese, Wes Sonnenreich |
Parution | 14/11/2003 |
Nb. de pages | 446 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 750g |
Intérieur | Noir et Blanc |
EAN13 | 9780071415040 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet