
Storage security
Protecting SANs, NAS, and DAS
Résumé
Here is the ultimate storage security handbook from the
nation's top secu-rity expert, renowned Hack Attacks author
John Chirillo. To create a detailed blueprint for
protecting vital storage systems, John and coauthor Scott
Blaul analyze SANs, DAS, and NAS in detail. They examine
strengths and weaknesses, describe architectural security
concerns and considerations, and identify ways to implement
and design more secure storage systems, protect against
security breaches, and develop effective countermeasures in
case of attack. If storage security is your responsibility,
you simply cannot afford to be without their advice.
You'll learn how to:
- Create and implement sound security policies and procedures for any storage system from any vendor
- Implement physical and logical security
- Use redundancy and protect against both internal and external security breaches
- Protect storage systems from malicious code attacks
- Detect storage intrusions and implement countermeasures
- Secure distributed versus centralized data
- Architect storage systems that are fundamentally secure
- Verify the effectiveness of a secu-rity plan with vulnerability and penetration testing
The companion Web site includes informative articles, evaluation matrices, selection spreadsheets, source code for custom intrusion monitoring of storage networks, and more.
Contents
- Chapter 1: Storage Evolution.
- Chapter 2: Direct Attached Storage (DAS).
- Chapter 3: Network Attached Storage (NAS).
- Chapter 4: Storage Area Network (SAN).
- Chapter 5: Data Availability.
- Chapter 6: Data Protection, Backup, and Recovery.
- Chapter 7: Selecting a Secure Storage Solution.
- Chapter 8: Designing and Implementing a Sound Data (NAS/SAN) Security Program.
- Chapter 9: Testing and Monitoring.
- Appendix A: What's on the Web Site.
- Appendix B: Useful Resources.
L'auteur - John Chirillo
JOHN CHIRILLO is Senior Inter-networking Engineer at
ValCom, a technology management company in the Midwest.
John holds numerous certifications including CCNA, CCDA,
CCNP, CISSP, Intel Certified Solutions Consultant, Compaq
ASE Enterprise Storage, and Master UNIX certifications,
among others. John has more than ten years of experience on
various computer systems and more than five years of
training experience. John is the author of five Wiley
books, including the Hack Attacks Series.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | John Chirillo, Scott Blaul |
Parution | 22/01/2003 |
Nb. de pages | 384 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 600g |
Intérieur | Noir et Blanc |
EAN13 | 9780764516887 |
ISBN13 | 978-0-7645-1688-7 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet