Storage security - Protecting SANs, NAS, and DAS - John Chirillo ,... - Librairie Eyrolles

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Storage security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Storage security

Storage security

Protecting SANs, NAS, and DAS

John Chirillo, Scott Blaul

384 pages, parution le 22/01/2003

Résumé

Here is the ultimate storage security handbook from the nation's top secu-rity expert, renowned Hack Attacks author John Chirillo. To create a detailed blueprint for protecting vital storage systems, John and coauthor Scott Blaul analyze SANs, DAS, and NAS in detail. They examine strengths and weaknesses, describe architectural security concerns and considerations, and identify ways to implement and design more secure storage systems, protect against security breaches, and develop effective countermeasures in case of attack. If storage security is your responsibility, you simply cannot afford to be without their advice.
You'll learn how to:

  • Create and implement sound security policies and procedures for any storage system from any vendor
  • Implement physical and logical security
  • Use redundancy and protect against both internal and external security breaches
  • Protect storage systems from malicious code attacks
  • Detect storage intrusions and implement countermeasures
  • Secure distributed versus centralized data
  • Architect storage systems that are fundamentally secure
  • Verify the effectiveness of a secu-rity plan with vulnerability and penetration testing

The companion Web site includes informative articles, evaluation matrices, selection spreadsheets, source code for custom intrusion monitoring of storage networks, and more.
Contents
  • Chapter 1: Storage Evolution.
  • Chapter 2: Direct Attached Storage (DAS).
  • Chapter 3: Network Attached Storage (NAS).
  • Chapter 4: Storage Area Network (SAN).
  • Chapter 5: Data Availability.
  • Chapter 6: Data Protection, Backup, and Recovery.
  • Chapter 7: Selecting a Secure Storage Solution.
  • Chapter 8: Designing and Implementing a Sound Data (NAS/SAN) Security Program.
  • Chapter 9: Testing and Monitoring.
  • Appendix A: What's on the Web Site.
  • Appendix B: Useful Resources.

L'auteur - John Chirillo

JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) John Chirillo, Scott Blaul
Parution 22/01/2003
Nb. de pages 384
Format 18,5 x 23,5
Couverture Broché
Poids 600g
Intérieur Noir et Blanc
EAN13 9780764516887
ISBN13 978-0-7645-1688-7

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription