Hardening Network Security
John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric S. Seagren, Paul Love, Rob Kraft, Mark O'Neill, Robert McMullin
- 出版商: McGraw-Hill Education
- 出版日期: 2004-12-01
- 售價: $1,890
- 貴賓價: 9.5 折 $1,796
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 0072257032
- ISBN-13: 9780072257038
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$2,145$2,038 -
$450$356 -
$750$638 -
$560$476 -
$980$774 -
$850$723 -
$780$616 -
$490$382 -
$620$490 -
$2,530$2,404 -
$650$507 -
$650$514 -
$450$383 -
$520$406 -
$580$458 -
$590$460 -
$590$460 -
$580$452 -
$1,730$1,644 -
$2,180$2,071 -
$1,320TSP-Leading a Development Team
-
$2,175$2,066 -
$750$585 -
$580$493 -
$650$553
相關主題
商品描述
Description:
Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.
Features a four-part hardening methodology:
- Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack
- Take It From The Top--Systematic approach to hardening your enterprise from the top down
- Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing
- How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program
Table of Contents:
Part I: Do This Now!
Chapter 1: Do These 7 Things Before You Do Anything Else
Part II: Take it From the Top. Systematically Hardening Your Enterprise
Chapter 2: Break the Network into Areas of Common Functionality
Chapter 3: Hardening with Identity Management Systems
Chapter 4: Hardening Cross Platform Authentication
Chapter 5: Implement Secure Centralized Authentication Mechanisms
Chapter 6: Mobile Authentication Considerations
Chapter 7: Beyond Access Controls - Protecting Stored Data
Chapter 8: Hardening Database Access
Chapter 9: Hardening Cross Platform Access Controls
Chapter 10: Hardening Data Transport Using Encryption
Chapter 11: Hardening Remote Clients (Windows, Mac, *nix)
Chapter 12: Hardening Wireless
Chapter 13: Hardening a Mixed Unix Network
Chapter 14: Intrusion Detection and Response
Chapter 15: Managing Malicious Code
Chapter 16: Hardening Wetware
Part III: Once is Never Enough
Chapter 17: Auditing and Testing Security
Chapter 18: Change Management
Chapter 19: Security Patching
Chapter 20: Security Review
Part IV: How to Succeed at Hardening
Chapter 21: Politics of Security Management
Chapter 22: Security Agnostics