Network Security First-Step

Cisco Press, 21 de mai. de 2004 - 480 páginas
0 Resenhas
As avaliações não são verificadas, mas o Google confere e remove conteúdo falso quando ele é identificado

Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy

Your first step to network security begins here!

  • Learn about hackers and their attacks
  • Understand security tools and technologies
  • Defend your network with firewalls, routers, and other devices
  • Explore security for wireless networks
  • Learn how to prepare for security incidents

Welcome to the world of network security!

Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them.

No security experience needed!

Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you!

De dentro do livro

O que estão dizendo - Escrever uma resenha

Não encontramos nenhuma resenha nos lugares comuns.


Here There Be Hackers
Security Policies and Responses
Overview of Security Technologies
Security Protocols
Router Security
IPSec Virtual Private Networks VPNs
Wireless Security
Intrusion Detection and Honeypots
Tools of the Trade
Answers to Chapter Review Questions
Back Cover
Direitos autorais

Outras edições - Ver todos

Termos e frases comuns

Passagens mais conhecidas

Página 19 - Interesting ports on ( : (The 1533 ports scanned but not shown below are in state: closed) Port State Service 21/tcp...
Página 68 - Passwords should never be written down or stored on-line. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation or other phrase. For example, the phrase might be: "This May Be One Way to Remember" and the password could be: "TmBlw2R!
Página 423 - Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services...
Página 57 - Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. System-level passwords should be changed quarterly; user-level passwords should be changed every six months.
Página 59 - Violations of the rights of any person or company protected by copyright, trade secret, patent, or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by <Company Name>.
Página 339 - It can perform protocol analysis, content searching /matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.
Página 36 - CERT Coordination Center (CERT/CC) is a center of Internet security expertise located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.
Página 160 - The traditional formula for the elements necessary for such a cause of action may be stated briefly as follows: 1. A duty, or obligation, recognized by the law, requiring the actor to conform to a certain standard of conduct, for the protection of others against unreasonable risks.
Página 35 - Details" sections that there is a CVE number listed for the exploit. CVE stands for Common Vulnerabilities and Exposures, and it is an effort by Mitre to come up with a list of standardized names for vulnerabilities and other information security exposures. CVE aims to standardize the names for all publicly known vulnerabilities and security exposures.
Página 85 - A man travels the world over in search of what he needs, and returns home to find it - George Moore © Copyright 2002 Alan Hodgkiss.

Sobre o autor (2004)

Tom Thomas claims he never works because he loves what he does. Along with his various roles in the networking industry, he is the author or coauthor of 17 books. Through his writing and his work as an instructor and a training-course developer, Tom has taught thousands of people how networking works.

Informações bibliográficas